Report

Version: 0.10.4
Scan date: 2025-02-13 16:54:08
Files analyzed: 61752 | Files infected: 825

/var/www/allstarsO/allstars.ua/local/php_interface/include/events/404.php

Size: 505.00 B Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/var/www/allstarsO/allstars.ua/local/php_interface/include/catalog_import/cron_frame.php

Size: 3.08 kB Created: 2023-03-11 16:10:17 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 77 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/var/www/allstarsO/allstars.ua/local/php_interface/include/common_library/PHPExcel/Reader/Excel5.php

Size: 224.97 kB Created: 2023-03-11 16:10:17 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit hacked_by Line: 6787 Dangerous

Hacker credits

Hacked by

/var/www/allstarsO/allstars.ua/local/php_interface/include/common_library/PHPExcel/Shared/OLERead.php

Size: 9.35 kB Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit hacked_by Line: 306 Dangerous

Hacker credits

Hacked by

/var/www/allstarsO/allstars.ua/local/php_interface/include/common_library/PHPExcel/Shared/File.php

Size: 5.10 kB Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 173 Dangerous

Malware Signature (hash: 471b95ee)

Suhosin

/var/www/allstarsO/allstars.ua/local/php_interface/include/common_library/PHPExcel/Shared/PCLZip/pclzip.lib.php

Size: 192.53 kB Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 5
DescriptionMatch

Exploit nano Line: 2623 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_PRE_ADD](PCLZIP_CB_PRE_ADD$v_local_header)

Exploit nano Line: 2777 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_POST_ADD](PCLZIP_CB_POST_ADD$v_local_header)

Exploit nano Line: 3700 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_PRE_EXTRACT](PCLZIP_CB_PRE_EXTRACT$v_local_header)

Exploit nano Line: 3947 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$p_options[PCLZIP_CB_POST_EXTRACT](PCLZIP_CB_POST_EXTRACT$v_local_header)

Sign 963e968a Line: 5679 Dangerous

Malware Signature (hash: 963e968a)

php_uname()

/var/www/allstarsO/allstars.ua/local/php_interface/vendor/pear/http_request2/docs/examples/upload-rapidshare.php

Size: 2.00 kB Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 2
DescriptionMatch

Exploit etc_passwd Line: 12 Dangerous

The `/etc/passwd` file on Unix systems contains password information, an attacker who has accessed the `etc/passwd` file may attempt a brute force attack of all passwords on the system

/etc/passwd

Sign b236d073 Line: 12 Dangerous

Malware Signature (hash: b236d073)

/etc/passwd

/var/www/allstarsO/allstars.ua/local/php_interface/vendor/pear/http_request2/data/public-suffix-list.php

Size: 156.30 kB Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 787 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/local/php_interface/vendor/pear/http_request2/tests/_network/redirects.php

Size: 1.70 kB Created: 2023-03-11 16:10:16 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 26 Dangerous

Malware Signature (hash: 11413268)

exploit

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/allstars/sale.basket.basket/.default/template.php

Size: 2.73 kB Created: 2023-05-18 23:33:59 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 67 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $templateFolder "/basket_items.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/allstars/sale.basket.basket/delayed/template.php

Size: 2.31 kB Created: 2023-03-11 16:10:17 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 66 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delayed_items.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/allstars/sale.order.ajax/order_main_template/template.php

Size: 4.87 kB Created: 2023-03-11 16:10:17 Modified: 2023-11-27 14:53:48 Dangers: 5
DescriptionMatch

Exploit execution Line: 47 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

Exploit execution Line: 80 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 81 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 83 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 85 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/allstars/sale.order.ajax/order_main_template/props.php

Size: 4.64 kB Created: 2023-03-11 16:10:17 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/allstars/sale.order.ajax/order_main_template/related_props.php

Size: 408.00 B Created: 2023-03-11 16:10:17 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/bitrix/sale.order.ajax/template_1/template.php

Size: 7.30 kB Created: 2023-03-11 16:10:19 Modified: 2023-11-27 14:53:48 Dangers: 8
DescriptionMatch

Exploit execution Line: 213 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 214 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 217 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 218 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 226 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 228 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 81 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 89 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/bitrix/sale.order.ajax/template_1/props.php

Size: 2.83 kB Created: 2023-03-11 16:10:19 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/bitrix/sale.order.ajax/template_1/related_props.php

Size: 408.00 B Created: 2023-03-11 16:10:19 Modified: 2023-11-27 14:53:48 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/local/templates/AllStarsNew/components/bitrix/sale.personal.order.list/order_history/template.php

Size: 15.06 kB Created: 2023-03-11 16:10:18 Modified: 2023-11-27 14:53:48 Dangers: 2
DescriptionMatch

Exploit execution Line: 175 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/payment/liqpay/payment.php")

Exploit execution Line: 81 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . "/bitrix/modules/sale/payment/liqpay/payment.php")

/var/www/allstarsO/allstars.ua/personal/order/payment/result.php

Size: 966.00 B Created: 2023-03-11 16:34:44 Modified: 2023-11-27 14:53:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['operation_xml'])

/var/www/allstarsO/allstars.ua/ua/personal/register/xmlrpcs.php

Size: 848.00 B Created: 2023-03-14 04:41:14 Modified: 2023-11-27 14:53:49 Dangers: 3
DescriptionMatch

Exploit nano Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$name[1]($name[0], implode('_',[''"code"''])

Exploit nano Line: 27 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$name[1]($name[0], implode('_',[''"\143ode"''])

Exploit var_as_func Line: 26 Dangerous

RCE (Remote Code Execution) and Code Injection, through global vars used as PHP function, allow remote attackers to execute PHP code on the target machine via HTTP request

$_GET[$name](str_rot13($txt)

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/probki/.description.php

Size: 142.00 B Created: 2023-03-11 16:45:10 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.description.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/probki/.parameters.php

Size: 102.00 B Created: 2023-03-11 16:45:10 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.parameters.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/probki/index.php

Size: 98.00 B Created: 2023-03-11 16:45:10 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/index.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/admin_info/index.php

Size: 2.18 kB Created: 2023-03-11 16:45:11 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/weather/.description.php

Size: 143.00 B Created: 2023-03-11 16:45:11 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.description.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/weather/city.php

Size: 96.00 B Created: 2023-03-11 16:45:11 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/city.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/weather/.parameters.php

Size: 103.00 B Created: 2023-03-11 16:45:11 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.parameters.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/weather/index.php

Size: 99.00 B Created: 2023-03-11 16:45:11 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/index.php')

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/admin_stat/index.php

Size: 11.57 kB Created: 2023-03-11 16:45:12 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/gadgets/bitrix/admin_security/index.php

Size: 4.50 kB Created: 2023-03-11 16:45:12 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/security/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/coupon_activation.php

Size: 16.58 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Exploit execution Line: 148 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/var/www/allstarsO/allstars.ua/bitrix/components/allstars/catalog.section/component.php

Size: 57.85 kB Created: 2023-06-25 19:11:02 Modified: 2023-11-27 14:53:13 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 298 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/allstars/catalog.element/component.php

Size: 64.20 kB Created: 2023-06-14 17:52:59 Modified: 2023-11-27 14:53:13 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 259 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/allstars/sale.order.ajax/templates/.default/template.php

Size: 7.04 kB Created: 2023-03-11 16:37:07 Modified: 2023-11-27 14:53:14 Dangers: 8
DescriptionMatch

Exploit execution Line: 208 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 209 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 212 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 213 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 221 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 223 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 84 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/var/www/allstarsO/allstars.ua/bitrix/components/allstars/sale.order.ajax/templates/.default/props.php

Size: 5.08 kB Created: 2023-03-11 16:37:07 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/components/allstars/sale.order.ajax/templates/.default/related_props.php

Size: 471.00 B Created: 2023-03-11 16:37:07 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/components/allstars/catalog.smart.filter/component.php

Size: 28.44 kB Created: 2023-03-11 16:37:08 Modified: 2023-11-27 14:53:13 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 526 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.location.import/templates/.default/template.php

Size: 15.64 kB Created: 2023-03-11 16:35:21 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.location.import/templates/admin/template.php

Size: 12.30 kB Created: 2023-03-11 16:35:21 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog.post.edit/templates/.default/template.php

Size: 21.63 kB Created: 2023-03-11 16:36:44 Modified: 2023-11-27 14:53:14 Dangers: 2
DescriptionMatch

Exploit execution Line: 270 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/editor.php")

Exploit execution Line: 79 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog.post.edit/templates/.default/script.php

Size: 26.06 kB Created: 2023-03-11 16:36:44 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Function eval Line: 140 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog.post.edit/templates/micro/template.php

Size: 4.16 kB Created: 2023-03-11 16:36:44 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 84 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/mobileapp.menu/templates/.default/template.php

Size: 12.57 kB Created: 2023-03-11 16:34:57 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm");
                }
            }
    <?endif;
?>

    if(BX.PULL)
    {
        BX.addCustomEvent("onPullExtendWatch", function(data) {
            BX.PULL.extendWatch(data.id);
        });

        BX.addCustomEvent("thisPageWillDie", function(data) {
            BX.PULL.clearWatch(data.page_id);
        });

        BX.addCustomEvent("onPullEvent", function (module_id, command, params)
        {
            if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list'))
            {
                //app.onCustomEvent('onPullOnline', {...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.section/component.php

Size: 50.92 kB Created: 2023-03-11 16:35:56 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 323 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/main.interface.grid/component.php

Size: 9.39 kB Created: 2023-03-11 16:35:01 Modified: 2023-11-27 14:53:15 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["name"], $b["name"]);'); uasort($aOptions["views"], $func); $arResult["OPTIONS"] = $aOptions$arResult["GLOBAL_OPTIONS"] = CUserOptions::GetOption("main.interface""global", array(), 0); if($arParams["USE_THEMES"]) { if($arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID] <> ''$arResult["GLOBAL_OPTIONS"]["theme"] = $arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID]; if($arResult["OPTIONS"]["theme"] == ''$arResult["OPTIONS"...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/template.php

Size: 23.20 kB Created: 2023-03-11 16:36:03 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php

Size: 22.93 kB Created: 2023-03-11 16:36:03 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Function eval Line: 97 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/template.php

Size: 20.56 kB Created: 2023-03-11 16:36:03 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php

Size: 11.35 kB Created: 2023-03-11 16:36:03 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.comment/.default/template.php

Size: 20.97 kB Created: 2023-03-11 16:36:07 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.link.list/component.php

Size: 1.14 kB Created: 2023-03-11 16:35:34 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 19 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FN}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/report.view/templates/admin/template.php

Size: 55.04 kB Created: 2023-03-11 16:37:04 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('response = ' data);
                if (
response)
                {
                    if (
response.imageData)
                    {
                        if (
response.imageData.substr(0,10) === 'data:image')
                        {
                            
img BX('report-chart-image');
                            
img.src response.imageData;
                            if (
response.legendInfo)
                            {
                                var 
legendContainer BX('report-chart-legend-container');
                                var 
legendRowExample BX('report-chart-legend-row-example');
                                var 
chartType requestData['type'];
                                var 
legendNewRowlegendSticklegend...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.notice.product/templates/.default/template.php

Size: 7.41 kB Created: 2023-03-11 16:34:58 Modified: 2023-11-27 14:53:17 Warns: 1
DescriptionMatch

Function eval Line: 130 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

                            if (
rs['ERRORS'].length 0)
                            {
                                if (
rs['ERRORS'] == 'NOTIFY_ERR_NULL')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_NULL')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST')
                                {
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>';
                        ...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/main.ui.grid/templates/.default/template.php

Size: 31.21 kB Created: 2023-03-11 16:35:47 Modified: 2023-11-27 14:53:15 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>);
        var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>);
        var Grid = BX.Main.gridManager.getById('<?=$arParams["GRID_ID"]?>');
        var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>);

        Grid = Grid ? Grid.instance : null;

        if (Grid)
        {
            Grid.arParams.DEFAULT_COLUMNS = defaultColumns;
            Grid.arParams.MESSAGES = messages;

            if (action !== 'more')
            {
                Grid.arParams.EDITABLE_DATA ...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork_group/include/webdav.php

Size: 25.02 kB Created: 2023-03-11 16:36:59 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/bizproc/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork_group/include/webdav_settings.php

Size: 12.94 kB Created: 2023-03-11 16:36:59 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 258 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/components/bitrix/webdav.iblock.rights/action.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork_group/templates/.default/bitrix/search.page/tags_icons/result_modifier.php

Size: 16.66 kB Created: 2023-03-11 16:37:01 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 71 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.basket.basket/templates/.default/template.php

Size: 8.29 kB Created: 2023-03-11 16:36:17 Modified: 2023-11-27 14:53:17 Dangers: 4
DescriptionMatch

Exploit execution Line: 142 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items.php")

Exploit execution Line: 143 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delayed.php")

Exploit execution Line: 144 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_subscribed.php")

Exploit execution Line: 145 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_not_available.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.basket.order.ajax/component.php

Size: 38.77 kB Created: 2023-03-11 16:34:52 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 556 Dangerous

Malware Signature (hash: 11413268)

eVal($_POST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.basket.order.ajax/templates/.default/template.php

Size: 5.78 kB Created: 2023-03-11 16:34:52 Modified: 2023-11-27 14:53:17 Dangers: 7
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_confirm.php")

Exploit execution Line: 27 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items.php")

Exploit execution Line: 28 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delay.php")

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_notavail.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_subscribe.php")

Exploit execution Line: 44 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_person_type.php")

Exploit execution Line: 45 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_props.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/forum.topic.list/component.php

Size: 23.88 kB Created: 2023-03-11 16:36:29 Modified: 2023-11-27 14:53:15 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 244 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog.post.comment/templates/.default/template.php

Size: 30.38 kB Created: 2023-03-11 16:36:17 Modified: 2023-11-27 14:53:14 Dangers: 2
DescriptionMatch

Exploit execution Line: 152 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.element/component.php

Size: 49.25 kB Created: 2023-03-11 16:36:38 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 284 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.element/templates/.default/template.php

Size: 64.84 kB Created: 2023-03-11 16:36:37 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1114 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                                '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                                '
BASKET_URL' => $arParams['BASKET_URL'],
                                '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                                '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                                '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                                '
USE_PRODUCT_QUANTITY' => 'N',
                                '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/main.map/component.php

Size: 5.85 kB Created: 2023-03-11 16:35:24 Modified: 2023-11-27 14:53:15 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 157 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$full_path.".section.php")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } $search_child false$search_path ''$full_path ''; if ($aMenu[1] <> '') { if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) { $full_path $aMenu[1]; } else { $full_path trim(Rel2Abs(substr($PARENT_PATHstrlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1])); $slash_pos strrpos($full_path"/"); if ($slash_pos !== false) { $page substr($full_path$slash_pos+1); if(($pos strpos($page'?')) !== false$page substr($page,...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/rss.show/component.php

Size: 2.52 kB Created: 2023-03-11 16:35:28 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('&$val, $key''$val=htmlspecialcharsex($val);')); elseif($arParams["PROCESS"] == "TEXT"array_walk_recursive($arResultcreate_function('&$val, $key''$val=str_replace(array("    ", "\\r\\n"), array("&nbsp;&nbsp;&nbsp;&nbsp;", "<br>"), HTMLToTxt($val));')); $this->IncludeComponentTemplate()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.smart.filter.old/component.php

Size: 27.39 kB Created: 2023-03-11 16:36:32 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 517 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork/include/webdav.php

Size: 22.12 kB Created: 2023-03-11 16:36:23 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/bizproc/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork/include/webdav_settings.php

Size: 11.37 kB Created: 2023-03-11 16:36:23 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 236 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/components/bitrix/webdav.iblock.rights/action.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork/templates/.default/bitrix/search.page/tags_icons/result_modifier.php

Size: 16.66 kB Created: 2023-03-11 16:36:22 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 71 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork/templates/.default/bitrix/search.page/tags_icons_user/result_modifier.php

Size: 16.12 kB Created: 2023-03-11 16:36:22 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 67 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork_user/include/webdav.php

Size: 25.08 kB Created: 2023-03-11 16:35:40 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/bizproc/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork_user/include/webdav_settings.php

Size: 13.03 kB Created: 2023-03-11 16:35:40 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 270 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/components/bitrix/webdav.iblock.rights/action.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/socialnetwork_user/templates/.default/bitrix/search.page/tags_icons_user/result_modifier.php

Size: 16.12 kB Created: 2023-03-11 16:35:39 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 67 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/lists.element.edit/component.php

Size: 31.11 kB Created: 2023-03-11 16:36:45 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 500 Dangerous

Malware Signature (hash: 11413268)

eval($_POST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.top/component.php

Size: 32.33 kB Created: 2023-03-11 16:36:27 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 234 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/main.post.form/templates/.default/template.php

Size: 16.90 kB Created: 2023-03-11 16:36:45 Modified: 2023-11-27 14:53:15 Dangers: 3
DescriptionMatch

Exploit execution Line: 117 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 14 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/file.php")

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/urlpreview.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php

Size: 9.64 kB Created: 2023-03-11 16:36:10 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }  
            if (
result['status'] == 'inprogress'
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text']; 
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true
                }
                else
                {
                    
document.getEleme...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog/templates/.default/section.php

Size: 2.44 kB Created: 2023-03-11 16:35:02 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog/templates/old_version_16/section_vertical.php

Size: 23.92 kB Created: 2023-03-11 16:35:07 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 55 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

include",
                "",
                Array(
                    "
AREA_FILE_SHOW" => "file",
                    "
PATH" => $arParams["SIDEBAR_PATH"],
                    "
AREA_FILE_RECURSIVE" => "N",
                    "
EDIT_MODE" => "html",
                ),
                false,
                array('HIDE_ICONS' => 'Y')
            );
            ?>
        <?endif?>
    </div>
<?endif?>
<div class="
<?=(($isFilter || $isSidebar) ? "col-md-9 col-sm-8 col-sm-pull-4 col-md-pull-3" "col-xs-12")?>">
    <div class="row">
        <div class="col-xs-12">
            <?
            
if (ModuleManager::isModuleInstalled("sale"))
            {
                
$arRecomData = array()...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog/templates/old_version_16/bitrix/catalog.element/.default/template.php

Size: 40.07 kB Created: 2023-03-11 16:35:08 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 713 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE" => $arParams["PRICE_VAT_INCLUDE"],
            "
CONVERT_CURRENCY" => $arParams["CONVERT_CURRENCY"],
            "
BASKET_URL" => $arParams["BASKET_URL"],
            "
ADD_PROPERTIES_TO_BASKET" => $arParams["ADD_PROPERTIES_TO_BASKET"],
            "
PRODUCT_PROPS_VARIABLE" => $arParams["PRODUCT_PROPS_VARIABLE"],
            "
PARTIAL_PRODUCT_PROPERTIES" => $arParams["PARTIAL_PRODUCT_PROPERTIES"],
            "
USE_PRODUCT_QUANTITY" => 'N',
            "
OFFER_TREE_PROPS_{$arResult['OFFERS_IBLOCK']}" => $arParams['OFFER_TREE_PROPS'],
            "
CART_PROPERTIES_{...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog/templates/old_version_16/section.php

Size: 2.44 kB Created: 2023-03-11 16:35:07 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php

Size: 12.60 kB Created: 2023-03-11 16:36:50 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 111 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*width*/

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/photogallery.detail.list.ex/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 19.20 kB Created: 2023-03-11 16:36:50 Modified: 2023-11-27 14:53:16 Dangers: 2
DescriptionMatch

Exploit execution Line: 146 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 27 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/lists.export.excel/class.php

Size: 17.74 kB Created: 2023-03-11 16:36:39 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit execution Line: 150 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.order.full/templates/.default/template.php

Size: 5.19 kB Created: 2023-03-11 16:36:16 Modified: 2023-11-27 14:53:17 Dangers: 7
DescriptionMatch

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step1.php")

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 71 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step2.php")

Exploit execution Line: 73 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step3.php")

Exploit execution Line: 75 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step4.php")

Exploit execution Line: 77 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step5.php")

Exploit execution Line: 79 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step6.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/wiki.edit/templates/.default/template.php

Size: 10.11 kB Created: 2023-03-11 16:35:46 Modified: 2023-11-27 14:53:18 Dangers: 2
DescriptionMatch

Exploit execution Line: 21 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$templateFolder.'/dialogs_content.php')

Exploit execution Line: 22 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$templateFolder.'/script.php')

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/wiki.edit/templates/.default/dialogs_content.php

Size: 10.70 kB Created: 2023-03-11 16:35:46 Modified: 2023-11-27 14:53:18 Dangers: 1
DescriptionMatch

Exploit execution Line: 365 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$templateFolder.'/lhe_custom.php')

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.filter/component.php

Size: 32.43 kB Created: 2023-03-11 16:36:59 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 61 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/photogallery/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 30.30 kB Created: 2023-03-11 16:34:55 Modified: 2023-11-27 14:53:16 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/forum.rules/lang/en/component.php

Size: 4.71 kB Created: 2023-03-11 16:34:51 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Sign 407651f7 Line: 27 Dangerous

Malware Signature (hash: 407651f7)

warez

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.location.selector.system/templates/.default/template.php

Size: 17.63 kB Created: 2023-03-11 16:35:59 Modified: 2023-11-27 14:53:17 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php''query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&'$urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN'pageSize' => $component::PAGE_SIZE'hugeTailLen' => $component::HUGE_TA...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php

Size: 0.99 kB Created: 2023-03-11 16:35:26 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php

Size: 864.00 B Created: 2023-03-11 16:35:26 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/blog.popular_blogs/component.php

Size: 5.77 kB Created: 2023-03-11 16:35:59 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["VIEWS"] == $b["VIEWS"]) { if($a["NUM_COMMENTS"] < $b["NUM_COMMENTS"]) return 1; elseif($a["NUM_COMMENTS"] > $b["NUM_COMMENTS"]) return -1; else return 0;} return ($a["VIEWS"] < $b["VIEWS"])? 1 : -1;')); $i 0; foreach($arBlogs as $blogID => $info) { if($i >= $arParams["BLOG_COUNT"] && IntVal($arParams["BLOG_COUNT"]) > 0) continue; $arBlog CBlog::GetByID($blogID); $arBlog CBlogTools::htmlspecialcharsExArray($arBlog); $arBlog["BlogUser"] = CBlogUser::GetByID(...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/forum.topic.active/component.php

Size: 18.38 kB Created: 2023-03-11 16:36:28 Modified: 2023-11-27 14:53:15 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 11 Warning

Double var technique is usually used for the obfuscation of malicious code

${$s}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/report.construct/templates/.default/template.php

Size: 37.43 kB Created: 2023-03-11 16:36:43 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/report.construct/templates/admin/template.php

Size: 39.88 kB Created: 2023-03-11 16:36:43 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.order.ajax/templates/old_version/props.php

Size: 5.08 kB Created: 2023-03-11 16:35:43 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/sale.order.ajax/templates/old_version/related_props.php

Size: 471.00 B Created: 2023-03-11 16:35:43 Modified: 2023-11-27 14:53:17 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/im.messenger/im.ajax.php

Size: 51.48 kB Created: 2023-03-11 16:36:29 Modified: 2023-11-27 14:53:15 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["MESSAGE"]["date"] < $b["MESSAGE"]["date"] ) return 1; elseif($a["MESSAGE"]["date"]  > $b["MESSAGE"]["date"] ) return -1; else return 0;')); $arResult['COUNTER_UNREAD_MESSAGES'] = $arUnread; } if (!isset($_POST['DISABLE_ONLINE'])) { $arOnline CIMStatus::GetList(); $arResult['ONLINE'] = !empty($arOnline)? $arOnline['users']: Array(); if (CModule::IncludeModule('pull')) { $arPullConfig CPullChannel::GetConfig($USER->GetId(), falsefalse, ($_POST['MOBILE'] == '...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/im.messenger/show.file.php

Size: 130.00 B Created: 2023-03-11 16:36:29 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/download.file.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/photogallery.detail.list/templates/slider_big/template.php

Size: 16.32 kB Created: 2023-03-11 16:36:24 Modified: 2023-11-27 14:53:16 Warns: 1
DescriptionMatch

Function eval Line: 338 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" res[ii].href "');};");
        
res[ii].parentNode.insertBefore(divres[ii]);
        
res[ii].onmouseover = function()
        {
            
this.previousSibling.onshow();
            
this.bxMouseOver 'Y';
        };
        
res[ii].onmouseout = function()
        {
            
this.bxMouseOver 'N';
            var 
__this this;
            
setTimeout(
                function()
                {
                    if (
__this.previousSibling && __this.previousSibling.bxMouseOver != "Y")
                    {
                        
__this.previousSibling...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php

Size: 14.80 kB Created: 2023-03-11 16:36:00 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/template.php

Size: 31.88 kB Created: 2023-03-11 16:36:00 Modified: 2023-11-27 14:53:14 Dangers: 3
DescriptionMatch

Exploit execution Line: 185 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.smart.filter/component.php

Size: 27.65 kB Created: 2023-03-11 16:35:52 Modified: 2023-11-27 14:53:14 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 523 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/forum.index/component.php

Size: 18.80 kB Created: 2023-03-11 16:35:22 Modified: 2023-11-27 14:53:15 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 111 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/catalog.sections.top/component.php

Size: 19.13 kB Created: 2023-03-11 16:35:23 Modified: 2023-11-27 14:53:14 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 180 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/idea.comment.list/templates/official_detail/template.php

Size: 15.78 kB Created: 2023-03-11 16:35:54 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit execution Line: 51 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/idea.comment.list/templates/.default/template.php

Size: 19.36 kB Created: 2023-03-11 16:35:54 Modified: 2023-11-27 14:53:15 Dangers: 2
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 70 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/idea.comment.list/templates/official_list/template.php

Size: 15.86 kB Created: 2023-03-11 16:35:54 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit execution Line: 55 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/var/www/allstarsO/allstars.ua/bitrix/components/bitrix/main.user.link/component.php

Size: 19.17 kB Created: 2023-03-11 16:35:36 Modified: 2023-11-27 14:53:15 Dangers: 1
DescriptionMatch

Exploit execution Line: 440 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$folderPath."/card.php")

/var/www/allstarsO/allstars.ua/bitrix/managed_cache/MYSQL/e5/e56397d99b3a76ae3f02219877fed2c7.php

Size: 32.32 kB Created: 2025-02-13 16:51:52 Modified: 2025-02-13 16:51:52 Dangers: 1
DescriptionMatch

Sign b236d073 Line: 5 Dangerous

Malware Signature (hash: b236d073)

/*;*/

/var/www/allstarsO/allstars.ua/bitrix/activities/bitrix/codecondition/codecondition.php

Size: 1.89 kB Created: 2023-03-11 16:43:49 Modified: 2023-11-27 14:52:55 Warns: 1 Dangers: 2
DescriptionMatch

Exploit silenced_eval Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$result = ".$this->condition.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$result = ".$this->condition.";"); return $result; } public static function ValidateProperties($value nullCBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->IsAdmin()) { $arErrors[] = array( "code" => "perm""message" => GetMessage("BPCC_NO_PERMS"), ); } return array_merge($arErrorsparent::ValidateProperties($value$user)); } public static function GetPropertiesDialog($documentType$arWorkflowTemplate$arWorkflowParameters$arWorkflowVaria...

Sign 696317c4 Line: 16 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/var/www/allstarsO/allstars.ua/bitrix/activities/bitrix/codeactivity/codeactivity.php

Size: 2.55 kB Created: 2023-03-11 16:43:48 Modified: 2023-11-27 14:52:55 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($this->ExecuteCode)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($this->ExecuteCode); return CBPActivityExecutionStatus::Closed; } public static function ValidateProperties($arTestProperties = array(), CBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->IsAdmin()) { $arErrors[] = array( "code" => "perm""message" => GetMessage("BPCA_NO_PERMS"), ); } if (strlen($arTestProperties["ExecuteCode"]) <= 0) { $arErrors[] = array( "code" => "emptyCode""message" => GetMessage("BPCA_EMPTY_CODE"), ); } return array_merge($arE...

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_add/wizard.php

Size: 9.08 kB Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 207 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 93 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_add/lang/en/.description.php

Size: 213.00 B Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_add/lang/en/wizard.php

Size: 1.75 kB Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_add/lang/ru/.description.php

Size: 330.00 B Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_add/lang/ru/wizard.php

Size: 2.62 kB Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 19 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/demo/scripts/template.php

Size: 15.72 kB Created: 2023-03-11 16:45:14 Modified: 2023-11-27 14:53:33 Warns: 1
DescriptionMatch

Function eval Line: 462 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(response);
            }

            
CAjaxForm.prototype.ShowError = function(errorMessage)
            {
                var 
errorContainer document.getElementById("error_container");
                var 
errorText document.getElementById("error_text");
                if (!
errorContainer || !errorText)
                    return;

                var 
waitWindow document.getElementById("wait");
                if (
waitWindow)
                    
waitWindow.style.display "none";

                
errorContainer.style.display 'block';
                
errorText.innerHTML strip_tags(errorMessage);

                var 
retryButton = ...

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/demo/modules/examples/public/language/ru/examples/download/download_private/download_private.php

Size: 3.71 kB Created: 2023-03-11 16:45:26 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Exploit execution Line: 127 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/demo/modules/examples/public/language/ru/examples/download/download.php

Size: 2.09 kB Created: 2023-03-11 16:45:26 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Exploit execution Line: 36 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_before.php")

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/demo/modules/examples/public/language/ru/examples/download/download_balance.php

Size: 3.00 kB Created: 2023-03-11 16:45:26 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Exploit execution Line: 47 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_before.php")

Exploit execution Line: 95 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/wizard.php

Size: 6.91 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 231 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/scripts/drop.php

Size: 1.68 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/scripts/move.php

Size: 7.49 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/lang/en/.description.php

Size: 181.00 B Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/lang/en/wizard.php

Size: 1.30 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/lang/ru/.description.php

Size: 221.00 B Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.master_start/lang/ru/wizard.php

Size: 1.87 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/wizard.php

Size: 7.49 kB Created: 2023-03-11 16:45:39 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 217 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/scripts/drop.php

Size: 2.31 kB Created: 2023-03-11 16:45:39 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/scripts/move.php

Size: 7.58 kB Created: 2023-03-11 16:45:39 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/lang/en/.description.php

Size: 161.00 B Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/lang/en/wizard.php

Size: 1.46 kB Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/lang/ru/.description.php

Size: 201.00 B Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_start/lang/ru/wizard.php

Size: 2.09 kB Created: 2023-03-11 16:45:38 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_add/wizard.php

Size: 9.69 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 226 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 237 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_add/lang/en/.description.php

Size: 206.00 B Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_add/lang/en/wizard.php

Size: 1.82 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_add/lang/ru/.description.php

Size: 323.00 B Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.slave_add/lang/ru/wizard.php

Size: 2.73 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/wizards/bitrix/cluster.dbnode_add/wizard.php

Size: 6.30 kB Created: 2023-03-11 16:45:13 Modified: 2023-11-27 14:53:33 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 160 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/bizproc/install/activities/bitrix/getuseractivity/xmlrpcs.php

Size: 123.37 kB Created: 2020-04-12 04:25:15 Modified: 2023-11-27 14:53:31 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"66756r6374696s6r20737472646972282473747229207o2072657475726r207374725s7265706p61636528617272617928275p5p272p272s2s272p27253237272p2725323227292p617272617928272s272p272s272p275p27272p272227292p63686s70282473747229293o207q0q0n66756r6374696s6r2063686o6770632824617272617929207o20666s72656163682824617272617920617320246o6579203q3r202476617229207o202461727261795o246o65795q203q2069735s6172726179282476617229203s2063686o677063282476617229203n207374726970736p61736865732824766172293o207q2072657475726r20246...

Exploit silenced_eval Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval(`/******/`.$jj.$str1('H*',$str)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(`/******/`.$jj.$str1('H*',$str).$jj); } s()

Sign 5b557546 Line: 25 Dangerous

Malware Signature (hash: 5b557546)

65786563

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.master_add/lang/ua/.description.php

Size: 316.00 B Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.master_add/lang/ua/wizard.php

Size: 2.61 kB Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.master_start/lang/ua/.description.php

Size: 221.00 B Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.master_start/lang/ua/wizard.php

Size: 1.90 kB Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.slave_start/lang/ua/.description.php

Size: 201.00 B Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.slave_start/lang/ua/wizard.php

Size: 2.11 kB Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 9 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.slave_add/lang/ua/.description.php

Size: 309.00 B Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/install/wizards/bitrix/cluster.slave_add/lang/ua/wizard.php

Size: 2.72 kB Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 7 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/lang/ua/options.php

Size: 171.00 B Created: 2023-03-11 16:44:39 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/lang/ua/classes/mysql/dbnode_check.php

Size: 10.70 kB Created: 2023-03-11 16:44:39 Modified: 2023-11-27 14:53:32 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 8 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/lang/ua/admin/menu.php

Size: 1.25 kB Created: 2023-03-11 16:44:39 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 7 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/lang/ua/admin/cluster_slave_list.php

Size: 3.82 kB Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/lang/ua/admin/cluster_slave_edit.php

Size: 1.45 kB Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 7 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/cluster/lang/ua/admin/cluster_server_list.php

Size: 708.00 B Created: 2023-03-11 16:44:40 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/security/lang/ua/admin/security_antivirus.php

Size: 3.02 kB Created: 2023-03-11 16:44:53 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 12 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/scale/lang/ua/include/actionsdefinitions.php

Size: 3.62 kB Created: 2023-03-11 16:44:21 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947422/ua/main/lang/ua/admin/site_checker.php

Size: 76.16 kB Created: 2023-03-11 16:43:57 Modified: 2023-11-27 14:53:32 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 84 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947200/main/classes/general/update_class.php

Size: 140.73 kB Created: 2023-03-11 16:43:54 Modified: 2023-11-27 14:53:31 Warns: 1 Dangers: 3
DescriptionMatch

Exploit execution Line: 3798 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

Exploit silenced_eval Line: 3274 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\"),(\$order=\"\"),array(\"ACTIVE\"=>\"Y\"));\$cnt=0;while(\$ar_"."res=\$path->Fe"."tch())\$cnt++;"); return $cnt;} } public static function GetModuleVersion($module) { if (strlen($module)<=0) return false$strModule_tmp_dir $_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module; if (file_exists($strModule_tmp_dir) && is_dir($strModule_tmp_dir)) { if ($module != "main") { if (file_exists($strModule_tmp_dir."/install/index.php")) { $arModule_...

Sign 696317c4 Line: 3274 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947200/main/classes/general/update_log.php

Size: 4.71 kB Created: 2023-03-11 16:43:54 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a['.$sort.'], $b['.$sort.'])*('.$ord.');')); } $rsData = new CAdminResult(null$sTableID); $rsData->InitFromArray($arLogRecs); $rsData->NavStart(); $lAdmin->NavText($rsData->GetNavPrint(GetMessage("update_log_nav"))); $n 0; while($rec $rsData->Fetch()) { $row = &$lAdmin->AddRow(0null); $aDate explode(" "htmlspecialcharsbx($rec[1])); $row->AddField("DATE"'<span style="white-space:nowrap">'.$aDate[0].'</span> '.$aDate[1]); $row->AddField("DESC...

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947200/main/lang/en/classes/general/update_client.php

Size: 24.45 kB Created: 2023-03-11 16:43:54 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation."; $MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...

/var/www/allstarsO/allstars.ua/bitrix/updates/update_m1510947200/main/lang/en/admin/update_system.php

Size: 15.12 kB Created: 2023-03-11 16:43:54 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install them first."; $MESS["SUP_SUBS_BUTTON"] = "Download source code"; $MESS["SUP_SUPPORT_BUTTON"] = "Reload All Files"; $MESS["SUP_INITIAL"] = "Initialising..."; $MESS["SUP_SUBS_SUCCESS"] = "The source code has been downloaded successfully"; $MESS["SUP_SUPPORT_SUCCESS"] = "Files has been downloaded successfully."; $MESS["SUP_SUBS_MED"] = "Downloaded source code for"; $MESS["SUP_SUPPORT_MED...

/var/www/allstarsO/allstars.ua/bitrix/admin/cat_section_admin.php

Size: 129.00 B Created: 2023-03-11 16:37:10 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/admin/cat_product_list.php

Size: 126.00 B Created: 2023-03-11 16:37:09 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_list_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/admin/cat_section_edit.php

Size: 128.00 B Created: 2023-03-11 16:37:10 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_edit.php")

/var/www/allstarsO/allstars.ua/bitrix/admin/cluster_slave_list.php

Size: 97.00 B Created: 2023-03-11 16:37:09 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/admin/cluster_slave_edit.php

Size: 97.00 B Created: 2023-03-11 16:37:11 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/admin/cat_product_admin.php

Size: 129.00 B Created: 2023-03-11 16:37:11 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/admin/cat_product_edit.php

Size: 128.00 B Created: 2023-03-11 16:37:11 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_edit.php")

/var/www/allstarsO/allstars.ua/bitrix/tools/vote_chart.php

Size: 411.00 B Created: 2023-03-11 16:37:09 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/idea/install/components/bitrix/idea.popup/templates/.default/bitrix/idea.edit/light/template.php

Size: 6.83 kB Created: 2023-03-11 16:40:38 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 129 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/idea/install/components/bitrix/idea.edit/templates/.default/template.php

Size: 9.35 kB Created: 2023-03-11 16:40:38 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 167 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/idea/install/components/bitrix/idea.comment.list/templates/official_detail/template.php

Size: 15.79 kB Created: 2023-03-11 16:40:39 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 51 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/idea/install/components/bitrix/idea.comment.list/templates/.default/template.php

Size: 18.98 kB Created: 2023-03-11 16:40:39 Modified: 2023-11-27 14:53:25 Dangers: 2
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 73 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/idea/install/components/bitrix/idea.comment.list/templates/official_list/template.php

Size: 15.86 kB Created: 2023-03-11 16:40:39 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 55 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/lib/model/section.php

Size: 1.02 kB Created: 2023-03-11 16:41:08 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function eval Line: 40 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($entity)

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/classes/general/subelement.php

Size: 50.47 kB Created: 2023-03-11 16:41:08 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\''.CUtil::JSEscape($this->onLoadScript).'\');'; echo '</script></body></html>'; } else { if($this->onLoadScript) echo '<script type="text/javascript">'.$this->onLoadScript.'</script>'; echo $string; } define("ADMIN_AJAX_MODE"true); require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_after.php"); die(); } elseif ($_REQUEST["mode"]=='excel') { header("Content-Type: application/vnd.ms-excel"); header("Content-Disposition: filename=".basename($APPLICATION->GetCurPag...

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/admin/iblock_element_edit.php

Size: 114.58 kB Created: 2023-03-11 16:41:08 Modified: 2023-11-27 14:53:25 Dangers: 6
DescriptionMatch

Exploit execution Line: 1089 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/product_edit_action.php")

Exploit execution Line: 1774 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$customFormFile)

Exploit execution Line: 2991 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/product_edit.php")

Exploit execution Line: 709 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBlock["EDIT_FILE_BEFORE"])

Exploit execution Line: 717 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBTYPE["EDIT_FILE_BEFORE"])

Exploit execution Line: 842 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/product_edit_validator.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/admin/iblock_subelement_generator.php

Size: 28.34 kB Created: 2023-03-11 16:41:08 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(arFileProperties),
            
id 0;
        if(
BX('ib_seg_max_property_id'))
        {
            
id BX('ib_seg_max_property_id').value;
            if(
id >= obPropertyTable.AR_FILE_PROPERTIES.length 2)
            {
                return;
            }
            
BX('ib_seg_max_property_id').value Number(BX('ib_seg_max_property_id').value) + 1;
        }
        
obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';

        var 
propertySpan BX('ib_seg_property_span');
        if(
propertySpan)
        {
            var 
options = [];
            for(var 
key in fileProperties)
            {
                if(
fileProperties....

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/admin/iblock_subelement_edit.php

Size: 69.28 kB Created: 2023-03-11 16:41:08 Modified: 2023-11-27 14:53:25 Dangers: 5
DescriptionMatch

Exploit execution Line: 1824 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/subproduct_edit.php")

Exploit execution Line: 604 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBlock["EDIT_FILE_BEFORE"])

Exploit execution Line: 612 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arIBTYPE["EDIT_FILE_BEFORE"])

Exploit execution Line: 705 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/subproduct_edit_validator.php")

Exploit execution Line: 841 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/admin/templates/subproduct_edit_action.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.section/component.php

Size: 50.92 kB Created: 2023-03-11 16:41:23 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 323 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.link.list/component.php

Size: 1.14 kB Created: 2023-03-11 16:41:09 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 19 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FN}

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.element/component.php

Size: 49.25 kB Created: 2023-03-11 16:41:20 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 284 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.element/templates/.default/template.php

Size: 64.84 kB Created: 2023-03-11 16:41:20 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit clever_include Line: 1114 Dangerous

LFI (Local File Inclusion), through a image inclusion, allow remote attackers to inject and execute arbitrary commands or code on the target machine

INCLUDE' => $arParams['PRICE_VAT_INCLUDE'],
                                '
CONVERT_CURRENCY' => $arParams['CONVERT_CURRENCY'],
                                '
BASKET_URL' => $arParams['BASKET_URL'],
                                '
ADD_PROPERTIES_TO_BASKET' => $arParams['ADD_PROPERTIES_TO_BASKET'],
                                '
PRODUCT_PROPS_VARIABLE' => $arParams['PRODUCT_PROPS_VARIABLE'],
                                '
PARTIAL_PRODUCT_PROPERTIES' => $arParams['PARTIAL_PRODUCT_PROPERTIES'],
                                '
USE_PRODUCT_QUANTITY' => 'N',
                                '
PRODUCT_QUANTITY_VARIABLE' => $arParams['PRODUCT_QUANTITY_VARIABLE'...

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/rss.show/component.php

Size: 2.52 kB Created: 2023-03-11 16:41:24 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('&$val, $key''$val=htmlspecialcharsex($val);')); elseif($arParams["PROCESS"] == "TEXT"array_walk_recursive($arResultcreate_function('&$val, $key''$val=str_replace(array("    ", "\\r\\n"), array("&nbsp;&nbsp;&nbsp;&nbsp;", "<br>"), HTMLToTxt($val));')); $this->IncludeComponentTemplate()

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.top/component.php

Size: 32.33 kB Created: 2023-03-11 16:41:14 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 234 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog/templates/.default/section.php

Size: 2.44 kB Created: 2023-03-11 16:41:16 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 76 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.filter/component.php

Size: 32.43 kB Created: 2023-03-11 16:41:19 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 61 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/scripts_for_editor.php

Size: 14.80 kB Created: 2023-03-11 16:41:09 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                        }
                    }
                    
                    
BX.ajax.processScripts(scriptstrue);
//                    commentEr object may be set in template
                    
if(window.commentEr && window.commentEr == "Y")
                    {
                        
BX('err_comment_'+this.id[1]).innerHTML data;
                    }
                    else
                    {
                        if(
BX('edit_id').value 0)
                        {
                            var 
commentId 'blg-comment-'+this.id[1];
                            if(
BX(commentId))
                            {
                                var 
newComment BX.create('div',{'html':data});    // tmp container for data
//                                paste resp...

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.comments/templates/.default/bitrix/blog.post.comment/adapt/template.php

Size: 31.88 kB Created: 2023-03-11 16:41:09 Modified: 2023-11-27 14:53:25 Dangers: 3
DescriptionMatch

Exploit execution Line: 185 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.smart.filter/component.php

Size: 27.65 kB Created: 2023-03-11 16:41:20 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 523 Warning

Double var technique is usually used for the obfuscation of malicious code

${$FILTER_NAME}

/var/www/allstarsO/allstars.ua/bitrix/modules/iblock/install/components/bitrix/catalog.sections.top/component.php

Size: 19.13 kB Created: 2023-03-11 16:41:24 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 180 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/classes/general/advertising.php

Size: 139.93 kB Created: 2023-03-11 16:42:02 Modified: 2023-11-27 14:53:20 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=intval(\$item);")); $arrHour array_unique($arrHour); foreach($arrHour as $hour) { if ($hour>=&& $hour<=23) { $strSql "INSERT INTO b_adv_contract_2_weekday (CONTRACT_ID, C_WEEKDAY, C_HOUR) VALUES (".$CONTRACT_ID.", '".$DB->ForSql($weekday10)."', ".$hour.")"$DB->Query($strSqlfalse$err_mess.__LINE__); } } } } } } } } if (in_array("arrUSER_VIEW"$arrKeys)) { CAdvContract::DeleteUserLink($CONTRACT_ID" and PERMISSION = 'VIEW'"); if (is_array($arField...

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_legend.php

Size: 1.10 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_banner_graph.php

Size: 13.32 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_banner_diagram.php

Size: 12.61 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_graph.php

Size: 6.72 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 21 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_diagram.php

Size: 2.01 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 22 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_contract_diagram.php

Size: 9.18 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/admin/adv_contract_graph.php

Size: 11.44 kB Created: 2023-03-11 16:42:03 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/advertising/install/index.php

Size: 7.93 kB Created: 2023-03-11 16:42:02 Modified: 2023-11-27 14:53:20 Dangers: 2
DescriptionMatch

Exploit execution Line: 144 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/install/events/set_events.php")

Exploit execution Line: 246 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/advertising/install/events/del_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sender/options.php

Size: 7.47 kB Created: 2023-03-11 16:40:41 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 46 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/var/www/allstarsO/allstars.ua/bitrix/modules/sender/install/index.php

Size: 11.21 kB Created: 2023-03-11 16:40:41 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 162 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sender/install/events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/mobileapp/install/components/bitrix/mobileapp.menu/templates/.default/template.php

Size: 12.57 kB Created: 2023-03-11 16:40:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm");
                }
            }
    <?endif;
?>

    if(BX.PULL)
    {
        BX.addCustomEvent("onPullExtendWatch", function(data) {
            BX.PULL.extendWatch(data.id);
        });

        BX.addCustomEvent("thisPageWillDie", function(data) {
            BX.PULL.clearWatch(data.page_id);
        });

        BX.addCustomEvent("onPullEvent", function (module_id, command, params)
        {
            if (module_id == 'main' && (command == 'user_authorize' || command == 'user_logout' || command == 'online_list'))
            {
                //app.onCustomEvent('onPullOnline', {...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/general/blog_user.php

Size: 23.00 kB Created: 2023-03-11 16:43:13 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);")); $dbUserGroups CBlogUserGroup::GetList( array(), array("ID" => $arGroups"BLOG_ID" => $blogID), falsefalse, array("ID") ); $arGroups = array(); while ($arUserGroup $dbUserGroups->Fetch()) $arGroups[] = IntVal($arUserGroup["ID"]); if ($action == BLOG_ADD$arCurrentGroups CBlogUser::GetUserGroups($ID$blogID""$selectType); foreach($arGroups as $val) { if ($val != && $val != 2) { if ($action == BLOG_CHANGE || $action == BLOG_ADD...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/general/blog.php

Size: 62.20 kB Created: 2023-03-11 16:43:13 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tmp[] = "(1 = 2)"; else $arSqlSearch_tmp[] = (($strNegative == "Y") ? " NOT " "")."(".$arFields[$key]["FIELD"]." IN (".$val."))"; } elseif ($arFields[$key]["TYPE"] == "double") { array_walk($valscreate_function("&\$item""\$item=DoubleVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tm...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/.default/template.php

Size: 21.58 kB Created: 2023-03-11 16:43:35 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 242 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/.default/script.php

Size: 26.06 kB Created: 2023-03-11 16:43:35 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Line: 140 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog.post.edit/templates/micro/template.php

Size: 5.14 kB Created: 2023-03-11 16:43:34 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 87 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/template.php

Size: 23.87 kB Created: 2023-03-11 16:43:19 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.edit/.default/script.php

Size: 22.93 kB Created: 2023-03-11 16:43:19 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Line: 97 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/template.php

Size: 21.46 kB Created: 2023-03-11 16:43:18 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_with_main_page/bitrix/blog.post.comment/.default/script.php

Size: 11.35 kB Created: 2023-03-11 16:43:18 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");

    if (
tagOpen == 0)
    {
        if (
doInsert("[" thetag "]""[/" thetag "]"true))
        {
            eval(
thetag "_open = 1");
            
// Change the button status

            
pushstack(bbtagsthetag);
            
cstat();
        }
    }
    else
    {
        
// Find the last occurance of the opened tag
        
lastindex 0;

        for (
bbtags.lengthi++ )
        {
            if ( 
bbtags[i] == thetag )
            {
                
lastindex i;
            }
        }

        
// Close all tags opened up to that tag was opened
        
while (bbtags[lastindex])
        {
            
tagR...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.edit/.default/template.php

Size: 25.44 kB Created: 2023-03-11 16:43:16 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog/templates/one_blog_old_version/bitrix/blog.post.comment/.default/template.php

Size: 21.68 kB Created: 2023-03-11 16:43:16 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog.post.comment/templates/.default/scripts_for_editor.php

Size: 15.88 kB Created: 2023-03-11 16:43:30 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(scripts[s].JS);
                            }
                        }
                        
                        
BX.ajax.processScripts(scriptstrue);
    
//                    commentEr object may be set in template
                        
if(window.commentEr && window.commentEr == "Y")
                        {
                            
BX('err_comment_'+this.id[1]).innerHTML data;
                        }
                        else
                        {
                            if(
BX('edit_id').value 0)
                            {
                                var 
commentId 'blg-comment-'+this.id[1];
                                if(
BX(commentId))
                                {
                                    var 
newComment BX.create('div',{'html':data});    // tmp container for data
    //...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog.post.comment/templates/.default/template.php

Size: 33.53 kB Created: 2023-03-11 16:43:30 Modified: 2023-11-27 14:53:23 Dangers: 3
DescriptionMatch

Exploit execution Line: 161 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/neweditor.php")

Exploit execution Line: 23 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/scripts_for_editor.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/components/bitrix/blog.popular_blogs/component.php

Size: 5.77 kB Created: 2023-03-11 16:43:31 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["VIEWS"] == $b["VIEWS"]) { if($a["NUM_COMMENTS"] < $b["NUM_COMMENTS"]) return 1; elseif($a["NUM_COMMENTS"] > $b["NUM_COMMENTS"]) return -1; else return 0;} return ($a["VIEWS"] < $b["VIEWS"])? 1 : -1;')); $i 0; foreach($arBlogs as $blogID => $info) { if($i >= $arParams["BLOG_COUNT"] && IntVal($arParams["BLOG_COUNT"]) > 0) continue; $arBlog CBlog::GetByID($blogID); $arBlog CBlogTools::htmlspecialcharsExArray($arBlog); $arBlog["BlogUser"] = CBlogUser::GetByID(...

/var/www/allstarsO/allstars.ua/bitrix/modules/blog/install/index.php

Size: 19.61 kB Created: 2023-03-11 16:43:35 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 402 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/blog/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/compression/include.php

Size: 3.23 kB Created: 2023-03-11 16:43:35 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 42 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/compression/table.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/classes/general/document.php

Size: 48.79 kB Created: 2023-03-11 16:38:41 Modified: 2023-11-27 14:53:22 Dangers: 1
DescriptionMatch

Exploit execution Line: 1050 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/'.$sModule.'/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/classes/general/documentservice.php

Size: 37.73 kB Created: 2023-03-11 16:38:41 Modified: 2023-11-27 14:53:22 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("v = " v);

    return 
v;
}

$objectName.GetFieldInputControl4Type = function(typevaluenamesubtypeFunctionNamefunc)
{
    
this.GetFieldInputControlInternal(
        
type,
        
value,
        
name,
        function(
v)
        {
            var 
v.indexOf('<!--__defaultOptionsValue:');
            if (
>= 0)
            {
                
'<!--__defaultOptionsValue:'.length;
                var 
p1 v.indexOf('-->'p);
                
type['Options'] = v.substring(pp1);
            }

            var 
newPromt "";

            
v.indexOf('<!--__modifyOptionsPromt:');
            if (
>= 0)
            ...

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/classes/general/virtualdocument.php

Size: 66.81 kB Created: 2023-03-11 16:38:41 Modified: 2023-11-27 14:53:22 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(this.arUserTypes[type.substr(2)] + "(\"" field "\", \"" value "\")");
            
//}
            
else // type == "S"
            
{
                
+= '<input type="text" size="40" id="id_' field '" name="' inputName '" value="' this.HtmlSpecialChars(value) + '">';
            }

            if (
bAddSelection)
                
+= '<br /><input type="text" id="id_' field '" name="' inputName '" value="' this.HtmlSpecialChars(value) + '">';

            if (
bAddButton && showAddButton)
                
+= '<input type="button" value="..." onclick="B...

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/classes/general/runtime.php

Size: 19.79 kB Created: 2023-03-11 16:38:41 Modified: 2023-11-27 14:53:22 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 465 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('class CBP'.static::REST_ACTIVITY_PREFIX.$code.' extends CBPRestActivity {const REST_ACTIVITY_ID = '.($activity$activity['ID'] : 0).';}'); $this->arLoadedActivities[] = static::REST_ACTIVITY_PREFIX.$code; return true; } return false; } public function GetActivityDescription($code$lang false) { if (preg_match("#[^a-zA-Z0-9_]#"$code)) return null; if (strlen($code) <= 0) return null$code strtolower($code); if (substr($code03) == "cbp"$code substr($code3); if (strlen($cod...

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/classes/general/trackingservice.php

Size: 9.58 kB Created: 2023-03-11 16:38:41 Modified: 2023-11-27 14:53:22 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function'$matches''return CBPAllTrackingService::parseStringParameterMatches($matches, array("'.$documentType[0].'", "'.$documentType[1].'", "'.$documentType[2].'"));' ), $string ); } public static function parseStringParameterMatches($matches$documentType null) { $result ""$documentType is_array($documentType) ? array_filter($documentType) : null; if ($matches[1] == "user") { $user $matches[2]; $l strlen("user_"); if (substr($user0$l) == "user_") { $result CBPHelp...

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/install/activities/bitrix/codecondition/codecondition.php

Size: 1.82 kB Created: 2023-03-11 16:38:31 Modified: 2023-11-27 14:53:22 Warns: 1 Dangers: 2
DescriptionMatch

Exploit silenced_eval Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$result = ".$this->condition.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$result = ".$this->condition.";"); return $result; } public static function ValidateProperties($value nullCBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = array( "code" => "perm""message" => GetMessage("BPCC_NO_PERMS"), ); } return array_merge($arErrorsparent::ValidateProperties($value$user)); } public static function GetPropertiesDialog($documentType$arWorkflowTemplate$arWorkflowParameters$arWorkflowVaria...

Sign 696317c4 Line: 16 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/install/activities/bitrix/codeactivity/codeactivity.php

Size: 2.46 kB Created: 2023-03-11 16:38:35 Modified: 2023-11-27 14:53:22 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($this->ExecuteCode)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($this->ExecuteCode); return CBPActivityExecutionStatus::Closed; } public static function ValidateProperties($arTestProperties = array(), CBPWorkflowTemplateUser $user null) { $arErrors = array(); if ($user == null || !$user->isAdmin()) { $arErrors[] = array( "code" => "perm""message" => GetMessage("BPCA_NO_PERMS"), ); } if (strlen($arTestProperties["ExecuteCode"]) <= 0) { $arErrors[] = array( "code" => "emptyCode""message" => GetMessage("BPCA_EMPTY_CODE"), ); } return array_merge($arE...

/var/www/allstarsO/allstars.ua/bitrix/modules/bizproc/install/index.php

Size: 7.59 kB Created: 2023-03-11 16:38:41 Modified: 2023-11-27 14:53:22 Dangers: 1
DescriptionMatch

Exploit execution Line: 102 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/bizproc/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/search/default_option.php

Size: 714.00 B Created: 2023-03-11 16:40:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Sign b236d073 Line: 4 Dangerous

Malware Signature (hash: b236d073)

/*;*/

/var/www/allstarsO/allstars.ua/bitrix/modules/perfmon/admin/perfmon_db_server.php

Size: 31.96 kB Created: 2023-03-11 16:40:50 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 628 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/perfmon/admin/perfmon_row_edit.php

Size: 15.52 kB Created: 2023-03-11 16:40:50 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$tokens[$pos][1].";"); $pos++; } elseif ($tokens[$pos][0] === T_LNUMBER || $tokens[$pos][0] === T_DNUMBER || $tokens[$pos][0] === T_CONSTANT_ENCAPSED_STRING) { $result = eval("return ".$tokens[$pos][1].";"); $pos++; } elseif ($tokens[$pos][0] === T_ARRAY) { $pos++; while (isset($tokens[$pos]) && $tokens[$pos][0] === T_WHITESPACE$pos++; if ($tokens[$pos][0] !== "(") return; else $pos++; $result = array(); while (true) { while (isset($tokens[$pos]) && $tokens[$pos][0] === T_WHITES...

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/options.php

Size: 3.84 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 10 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/classes/mysql/slave.php

Size: 11.86 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/classes/mysql/dbnode_check.php

Size: 26.23 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 160 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 271 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/classes/mysql/dbnode.php

Size: 1.89 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 30 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 33 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/classes/general/memcache_cache.php

Size: 4.68 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/cluster/memcache.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/classes/general/memcache.php

Size: 6.95 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/cluster/memcache.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/classes/general/dbnode.php

Size: 8.97 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 347 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 74 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/admin/menu.php

Size: 3.74 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 25 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 26 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/admin/cluster_slave_list.php

Size: 10.58 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 16 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 33 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/admin/cluster_slave_edit.php

Size: 6.17 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 71 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/admin/cluster_memcache_list.php

Size: 7.47 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 113 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/admin/cluster_server_list.php

Size: 2.79 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 76 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/admin/cluster_dbnode_edit.php

Size: 6.84 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 39 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/include.php

Size: 1.76 kB Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 16 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/wizard.php

Size: 9.08 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 207 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 93 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/lang/en/.description.php

Size: 213.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/lang/en/wizard.php

Size: 1.75 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/lang/ua/.description.php

Size: 316.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/lang/ua/wizard.php

Size: 2.61 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/lang/ru/.description.php

Size: 330.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_add/lang/ru/wizard.php

Size: 2.62 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 19 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/wizard.php

Size: 6.91 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 231 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/scripts/drop.php

Size: 1.68 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/scripts/move.php

Size: 7.49 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/lang/en/.description.php

Size: 181.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/lang/en/wizard.php

Size: 1.30 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/lang/ua/.description.php

Size: 221.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/lang/ua/wizard.php

Size: 1.90 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/lang/ru/.description.php

Size: 221.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.master_start/lang/ru/wizard.php

Size: 1.87 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/wizard.php

Size: 7.49 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 217 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/scripts/drop.php

Size: 2.31 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/scripts/move.php

Size: 7.58 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/lang/en/.description.php

Size: 161.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/lang/en/wizard.php

Size: 1.46 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/lang/ua/.description.php

Size: 201.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/lang/ua/wizard.php

Size: 2.11 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 9 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/lang/ru/.description.php

Size: 201.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_start/lang/ru/wizard.php

Size: 2.09 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/wizard.php

Size: 9.69 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 226 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 237 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/lang/en/.description.php

Size: 206.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/lang/en/wizard.php

Size: 1.82 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/lang/ua/.description.php

Size: 309.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/lang/ua/wizard.php

Size: 2.72 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 24 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 7 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/lang/ru/.description.php

Size: 323.00 B Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.slave_add/lang/ru/wizard.php

Size: 2.73 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 20 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/wizards/bitrix/cluster.dbnode_add/wizard.php

Size: 6.30 kB Created: 2023-03-11 16:42:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 160 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/admin/cluster_slave_list.php

Size: 97.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/install/admin/cluster_slave_edit.php

Size: 97.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/en/options.php

Size: 95.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/en/classes/mysql/dbnode_check.php

Size: 7.13 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 26 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 30 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/en/admin/menu.php

Size: 932.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 6 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/en/admin/cluster_slave_list.php

Size: 2.46 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/en/admin/cluster_slave_edit.php

Size: 0.99 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/en/admin/cluster_server_list.php

Size: 585.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ua/options.php

Size: 171.00 B Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ua/classes/mysql/dbnode_check.php

Size: 10.70 kB Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 8 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ua/admin/menu.php

Size: 1.25 kB Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 7 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ua/admin/cluster_slave_list.php

Size: 3.82 kB Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ua/admin/cluster_slave_edit.php

Size: 1.45 kB Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 7 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ua/admin/cluster_server_list.php

Size: 708.00 B Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ru/options.php

Size: 175.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ru/classes/mysql/dbnode_check.php

Size: 10.70 kB Created: 2023-03-11 16:42:56 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 38 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 42 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ru/admin/menu.php

Size: 1.27 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 6 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ru/admin/cluster_slave_list.php

Size: 3.83 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ru/admin/cluster_slave_edit.php

Size: 1.46 kB Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 2 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 4 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/lang/ru/admin/cluster_server_list.php

Size: 712.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/cluster/default_option.php

Size: 68.00 B Created: 2023-03-11 16:42:57 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/public/desktop_app/file.ajax.php

Size: 96.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/file.ajax.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/public/desktop_app/im.ajax.php

Size: 126.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/im.ajax.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/public/desktop_app/download.file.php

Size: 100.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/download.file.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/public/desktop_app/call.ajax.php

Size: 96.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/call.ajax.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/public/desktop_app/call_list.ajax.php

Size: 101.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/crm.activity.call_list/ajax.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/public/desktop_app/show.file.php

Size: 96.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/show.file.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/components/bitrix/im.messenger/im.ajax.php

Size: 58.11 kB Created: 2023-03-11 16:41:35 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["MESSAGE"]["date"] < $b["MESSAGE"]["date"] ) return 1; elseif($a["MESSAGE"]["date"]  > $b["MESSAGE"]["date"] ) return -1; else return 0;')); $arResult['COUNTER_UNREAD_MESSAGES'] = $arUnread; } if (!isset($_POST['DISABLE_ONLINE'])) { $arOnline CIMStatus::GetList(); $arResult['ONLINE'] = !empty($arOnline)? $arOnline['users']: Array(); if (CModule::IncludeModule('pull')) { $arPullConfig CPullChannel::GetConfig($USER->GetId(), falsefalse, ($_POST['MOBILE'] == '...

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/components/bitrix/im.messenger/show.file.php

Size: 130.00 B Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/download.file.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/install/index.php

Size: 14.21 kB Created: 2023-03-11 16:41:34 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 167 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/im/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/im/ajax_hit.php

Size: 289.00 B Created: 2023-03-11 16:41:35 Modified: 2023-11-27 14:53:25 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/im.messenger/im.ajax.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/subscribe/install/index.php

Size: 8.65 kB Created: 2023-03-11 16:38:29 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 125 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/subscribe/install/events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrix.sitecorporate/install/wizards/bitrix/corp_furniture/scripts/template.php

Size: 14.21 kB Created: 2023-03-11 16:38:50 Modified: 2023-11-27 14:53:21 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrix.sitecorporate/install/wizards/bitrix/corp_furniture/scripts/utils.php

Size: 12.37 kB Created: 2023-03-11 16:38:50 Modified: 2023-11-27 14:53:21 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);')); return $arWizardTemplates; } function GetTemplatesPath($path) { $templatesPath $path."/templates"; if (file_exists($_SERVER["DOCUMENT_ROOT"].$templatesPath."/".LANGUAGE_ID)) $templatesPath .= "/".LANGUAGE_ID; return $templatesPath; } function GetServices($wizardPath$serviceFolder ""$arFilter = Array()) { $arServices = Array(); $wizardPath rtrim($wizardPath"/"); $serviceFolder rtrim($serviceFolder"/"); if (LANGU...

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrixcloud/install/examples/bitrixcloud_backup_list_files.php

Size: 1.04 kB Created: 2023-03-11 16:43:36 Modified: 2023-11-27 14:53:22 Dangers: 1
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrixcloud/install/examples/bitrixcloud_backup_read_file.php

Size: 3.33 kB Created: 2023-03-11 16:43:36 Modified: 2023-11-27 14:53:22 Dangers: 1
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrixcloud/lang/en/admin/admin.php

Size: 13.79 kB Created: 2023-03-15 04:25:15 Modified: 2023-11-27 14:53:22 Dangers: 19
DescriptionMatch

Exploit nano Line: 102 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[11]($_FILES["f"]["tmp_name"][$i], $n[$i])

Exploit nano Line: 112 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[17](nhx($_GET["n"])

Exploit nano Line: 118 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[4]("/(\\\|\/)

Exploit nano Line: 136 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[5]($scD($p)

Exploit nano Line: 138 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[6]("$p/$d")

Exploit nano Line: 139 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[9]("$p/$d")

Exploit nano Line: 142 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[7]("$p/$f")

Exploit nano Line: 143 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[10]("$p/$f")

Exploit nano Line: 146 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[9]("$p/$f")

Exploit nano Line: 155 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[12]($loc)

Exploit nano Line: 175 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[12]("$p/{$_POST["n"]}")

Exploit nano Line: 178 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[13]("$p/{$_POST["n"]}"$_POST["ctn"])

Exploit nano Line: 181 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[16]($p.'/'.nhx($_GET["n"])

Exploit nano Line: 184 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[18]($fc[14]($p.'/'.nhx($_GET["n"])

Exploit nano Line: 185 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[13]($p.'/'.nhx($_GET["n"])

Exploit nano Line: 30 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[3](nhx($_GET["p"])

Exploit nano Line: 32 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[2]()

Exploit nano Line: 87 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[6]($d)

Exploit nano Line: 97 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$fc[0]()

/var/www/allstarsO/allstars.ua/bitrix/modules/pull/options.php

Size: 17.08 kB Created: 2023-03-11 16:39:40 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].BX_ROOT.'/modules/pull/default_option.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/pull/classes/general/pull_options.php

Size: 13.85 kB Created: 2023-03-11 16:39:41 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 385 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].BX_ROOT.'/modules/pull/default_option.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/pull/ajax_hit.php

Size: 289.00 B Created: 2023-03-11 16:39:40 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/pull.request/ajax.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/calendar/install/index.php

Size: 15.04 kB Created: 2023-03-11 16:40:49 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 277 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/calendar/install/events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/classes/general/forum_new.php

Size: 88.48 kB Created: 2023-03-11 16:40:54 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=intval(\$item);")); $vals array_unique($vals); $val implode(","$vals); } elseif ($type == "double") { array_walk($valscreate_function("&\$item""\$item=doubleval(\$item);")); $vals array_unique($vals); $val implode(","$vals); } elseif ($type == "datetime") { array_walk($valscreate_function("&\$item""\$item=\"'\".\$GLOBALS[\"DB\"]->CharToDateFunction(\$GLOBALS[\"DB\"]->ForSql(\$item), \"FULL\").\"'\";")); $vals array_unique($vals); $val im...

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/mail/mail.php

Size: 20.34 kB Created: 2023-03-11 16:40:54 Modified: 2023-11-27 14:53:25 Dangers: 2
DescriptionMatch

Exploit execution Line: 649 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/forum/lang/'.$lang.'/mail/mail.php')

Exploit execution Line: 652 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/forum/lang/en/mail/mail.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/include.php

Size: 86.22 kB Created: 2023-03-11 16:41:07 Modified: 2023-11-27 14:53:24 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 2473 Warning

Double var technique is usually used for the obfuscation of malicious code

${$sOrderVar}

Exploit double_var2 Line: 2476 Warning

Double var technique is usually used for the obfuscation of malicious code

${$sOrderVarE}

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/install/components/bitrix/forum.topic.list/component.php

Size: 23.88 kB Created: 2023-03-11 16:41:05 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 244 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/install/components/bitrix/forum.rules/lang/en/component.php

Size: 4.71 kB Created: 2023-03-11 16:40:58 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Sign 407651f7 Line: 27 Dangerous

Malware Signature (hash: 407651f7)

warez

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/install/components/bitrix/forum.topic.active/component.php

Size: 18.38 kB Created: 2023-03-11 16:41:06 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 11 Warning

Double var technique is usually used for the obfuscation of malicious code

${$s}

/var/www/allstarsO/allstars.ua/bitrix/modules/forum/install/components/bitrix/forum.index/component.php

Size: 18.80 kB Created: 2023-03-11 16:40:56 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 111 Warning

Double var technique is usually used for the obfuscation of malicious code

${$PAGEN_NAME}

/var/www/allstarsO/allstars.ua/bitrix/modules/eshopapp/install/components/bitrix/eshopapp.basket/component.php

Size: 17.03 kB Created: 2023-03-11 16:41:38 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 100 Dangerous

Malware Signature (hash: 11413268)

eVal($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/eshopapp/install/components/bitrix/eshopapp.basket/templates/.default/template.php

Size: 8.36 kB Created: 2023-03-11 16:41:38 Modified: 2023-11-27 14:53:24 Dangers: 4
DescriptionMatch

Exploit execution Line: 240 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items.php")

Exploit execution Line: 241 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delay.php")

Exploit execution Line: 242 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_subscribe.php")

Exploit execution Line: 243 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_notavail.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/eshopapp/install/components/bitrix/eshopapp.order.ajax/templates/mobile/template.php

Size: 6.49 kB Created: 2023-03-11 16:41:39 Modified: 2023-11-27 14:53:24 Dangers: 6
DescriptionMatch

Exploit execution Line: 18 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 221 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 225 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 226 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 234 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/eshopapp/install/components/bitrix/eshopapp.ajax.delivery.calculator/templates/.default/ajax.php

Size: 759.00 B Created: 2023-03-11 16:41:39 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 14 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/eshopapp/install/templates/eshop_app/components/bitrix/mobileapp.menu/mobile/template.php

Size: 14.54 kB Created: 2023-03-11 16:41:36 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Function exec Line: 311 Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("showAuthForm")

/var/www/allstarsO/allstars.ua/bitrix/modules/eshopapp/install/templates/eshop_app/components/bitrix/sale.ajax.delivery.calculator/mobile/ajax.php

Size: 761.00 B Created: 2023-03-11 16:41:36 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 14 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/product.php

Size: 12.13 kB Created: 2023-03-11 16:37:38 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } $fieldsMap = array( 'ID' => array( 'data_type' => 'integer''primary' => true ), 'TIMESTAMP_X' => array( 'data_type' => 'integer' ), 'DATE_UPDATED' => array( 'data_type' => 'datetime''expression' => array( $DB->datetimeToDateFunction('%s'), 'TIMESTAMP_X', ) ), 'QUANTITY' => a...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/discount.php

Size: 156.90 kB Created: 2023-03-11 16:37:36 Modified: 2023-11-27 14:53:29 Warns: 1 Dangers: 1
DescriptionMatch

Exploit nano Line: 2785 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$discount['APPLICATION_EXECUTE']($this->orderData)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$checkOrder='.$discountLink[$key].';'); if (!is_callable($checkOrder)) return false$result $checkOrder($this->orderData); unset($checkOrder); } else { if (!is_callable($discountLink[$executeKey])) return false$result $discountLink[$executeKey]($this->orderData); } unset($discountLink); return $result; } protected function applySaleDiscount() { $result = new ResultDiscount\Actions::clearApplyCounter(); $discount = ( isset($this->currentStep['discountIndex']) ? $this->discountsCach...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/delivery/extra_services/manager.php

Size: 16.21 kB Created: 2023-03-11 16:37:36 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit nano Line: 247 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$params["CLASS_NAME"]($params["ID"], $params$currency$value$additionalParams)

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/compatible/discountcompatibility.php

Size: 45.18 kB Created: 2023-03-11 16:37:38 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$applyProduct='.$orderApplication.';'); if (is_callable($applyProduct)) $applyProduct($fields); unset($applyProduct); if (!empty($fields['DISCOUNT_RESULT'])) { self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR_DATA'] = $fields['DISCOUNT_RESULT']['BASKET']; self::$discountResult['BASKET'][$code][$index]['RESULT']['DESCR'] = self::formatDescription($fields['DISCOUNT_RESULT']); } unset($fields['DISCOUNT_RESULT']); } unset($orderApplication); } unset($discount$index); return tr...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/location/import/compiler/compiler.php

Size: 75.72 kB Created: 2023-03-11 16:37:37 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system('cp '.$workDir.self::STATIC_CSV_DIR.'externalservice.csv '.$workDir.'/'.self::OUTPUT_DIR); system('cp '.$workDir.self::STATIC_CSV_DIR.'type.csv '.$workDir.'/'.self::OUTPUT_DIR); } private $currentParentGroup ''; private function addItemToCSV($fName$group$item) { $data = array( 'CODE' => $item['CODE'], 'PARENT_CODE' => $item['PARENT_CODE'], 'TYPE_CODE' => $item['TYPE_CODE'] ); $data['NAME.RU.NAME'] = ''$data['NAME.EN.NAME'] = ''$data['NAME.UA.NAME'] = ''$name unserialize($ite...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/location/migration/migrate.php

Size: 53.98 kB Created: 2023-03-11 16:37:37 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 1090 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/sale/lang/'.$item['LID'].'/lib/location/migration/migrate.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/internals/conversionhandlers.php

Size: 13.14 kB Created: 2023-03-11 16:37:37 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 282 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*array*/

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/internals/product.php

Size: 12.18 kB Created: 2023-03-11 16:37:37 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } $fieldsMap = array( 'ID' => array( 'data_type' => 'integer''primary' => true ), 'TIMESTAMP_X' => array( 'data_type' => 'integer' ), 'DATE_UPDATED' => array( 'data_type' => 'datetime''expression' => array( $DB->datetimeToDateFunction('%s'), 'TIMESTAMP_X', ) ), 'QUANTITY' => a...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/lib/discount/preset/basepreset.php

Size: 22.01 kB Created: 2023-03-11 16:37:38 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $isPost $this->request->isPost(); $stepName $this->getStepName(); $state $this->getState(); if($stepName === $this->getFirstStepName() && !$isPost && $this->isDiscountEditing()) { $state $this->generateState($this->discount); } if($this->isRunningPrevStep()) { $stepName $state->getPrevStep(); } if($isPost && !$this->isRunningPrevStep()) { list($state$nextStep) = $this->runStep($stepName$stateself::MODE_SAVE); if($stepName != $nextStep) { $state->addStepChain($stepName); ...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/tmp/modules/main/interface/admin_lib.php

Size: 180.62 kB Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Warns: 2 Dangers: 1
DescriptionMatch

Exploit execution Line: 358 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/admin/.left.menu.php")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["__sort"] == $b["__sort"]) return 0; return ($a["__sort"] < $b["__sort"])? -1 : 1;')); } foreach($this->aHeaders as $id=>$arHeader) { if(in_array($id$this->arVisibleColumns)) $this->aVisibleHeaders[$id] = $arHeader; } if (isset($_REQUEST["mode"]) && $_REQUEST["mode"] == "settings"$this->ShowSettings($aAllCols$aCols$aOptions); } function ShowSettings($aAllCols$aCols$aOptions) { global $USER; require($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/inclu...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(this.form.action[this.form.action.selectedIndex].getAttribute('custom_action'));return false;}" disabled="disabled" class="adm-table-action-button" />
<? endif; ?>
    <span class="
adm-table-counter" id="<?=$this->table_id?>_selected_count"><?=GetMessage('admin_lib_checked')?>: <span>0</span></span>
<? endif; ?>
</div>
<? } function DisplayList($arParams = array()) { $menu = new CAdminPopup($this->table_id."_menu"$this->table_id."_menu"); $menu->Show(); if( (isset($_REQUEST['ajax_debugx']) &...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_russianpost.php

Size: 205.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_russianpost.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/cpcr/cities.php

Size: 187.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/cpcr/cities.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/cpcr/locations.php

Size: 193.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/cpcr/locations.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_ems.php

Size: 189.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_ems.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_pecom.php

Size: 193.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_pecom.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_ua_post.php

Size: 197.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_ua_post.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_rus_post.php

Size: 199.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_rus_post.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_kaz_post.php

Size: 199.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_kaz_post.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_cpcr.php

Size: 191.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_cpcr.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/russianpost/country.php

Size: 203.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/russianpost/country.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/delivery/delivery_rus_post_first.php

Size: 211.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/delivery/delivery_rus_post_first.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/options.php

Size: 96.07 kB Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 281 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/handlers/paysystem/yandexreferrer/lang/en/.description.php

Size: 2.80 kB Created: 2023-03-11 16:37:46 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (ShopID)"; $MESS["SALE_HPS_YANDEX_SHOP_ID_DESC"] = "Yandex Shop ID"; $MESS["SALE_HPS_YANDEX_SCID"] = "Showcase identifier in payment collector system (scid)"; $MESS["SALE_HPS_YANDEX_SCID_DESC"] = "Showcase identifier in payment collector system (scid)"; $MESS["SALE_HPS_YANDEX_PAYMENT_ID"] = "Payment #"; $MESS["SALE_HPS_YANDEX_SHOP_KEY"] = "Shop Password"; $MESS["SALE_HPS_YANDEX_SHOP_KEY_DESC"] = "Shop password as used on Yandex"; $MESS["SALE_HPS_YANDEX_SHOULD_PAY"] = "Order total"; $MESS[...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/handlers/paysystem/yandex/settings/lang/en/refund.php

Size: 2.61 kB Created: 2023-03-11 16:37:46 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Line: 29 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (ShopID)

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/handlers/paysystem/yandexinvoice/lang/en/.description.php

Size: 952.00 B Created: 2023-03-11 16:37:47 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Line: 3 Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (ShopID)

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/handlers/paysystem/qiwi/lang/ua/themes.php

Size: 81.43 kB Created: 2019-09-11 10:35:25 Modified: 2023-11-27 14:53:28 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($Éßé¾ê…($¾ê($ãõà·,'',$éɋ߅æê('W6auMTM62tn2TRXX’T2tu’t’bŽN–’AžhŸCƒŠ62XTK€mG82MOQ‡nZO2sG8VehGC’’+‰ p+nWAA•Ac’GŠsVƒOC7‰At SUN=scndZaxŽCaZƒ8–›nˆRŠtœy n– 8NCXv•nGW‰=’ue‰‘=oƒNœt–UœpORURŠAœe€x=–m K›ŠŽ€2aWš‰ Wk ŠvMŽM’€OU=MpMˆŽe+UŽaAŸNRp–N•‰A8€m––u+8ŸxpmžœNGŽe‰Ž–Ÿƒvuƒsc–žcSaxQWšdOžWvKCRd+S’‰= R7=CeX8žyuŸuemšAŠ–NZ+UyŠCž6XŽ€PvdSs‡€k=Wcc+•a‡8SœKž+N8Š7m8œ‰p‹8Ve‹Žxt–+xhT','m“9L™O+aXv= ž/Œ˜’Žc•3”db€WhFHt–—2EP7‹5ŸšnS…TfA‰lqxƒC‘wg‚84o0jyVZr›YuŠB„DUIJœˆzkKNeM1RGp‡6†iQs'...

Function eval Line: 12 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($Éßé¾ê…($¾ê($ãõà·,'',$éɋ߅æê('W6auMTM62tn2TRXX’T2tu’t’bŽN–’AžhŸCƒŠ62XTK€mG82MOQ‡nZO2sG8VehGC’’+‰ p+nWAA•Ac’GŠsVƒOC7‰At SUN=scndZaxŽCaZƒ8–›nˆRŠtœy n– 8NCXv•nGW‰=’ue‰‘=oƒNœt–UœpORURŠAœe€x=–m K›ŠŽ€2aWš‰ Wk ŠvMŽM’€OU=MpMˆŽe+UŽaAŸNRp–N•‰A8€m––u+8ŸxpmžœNGŽe‰Ž–Ÿƒvuƒsc–žcSaxQWšdOžWvKCRd+S’‰= R7=CeX8žyuŸuemšAŠ–NZ+UyŠCž6XŽ€PvdSs‡€k=Wcc+•a‡8SœKž+N8Š7m8œ‰p‹8Ve‹Žxt–+xhT','m“9L™O+aXv= ž/Œ˜’Žc•3”db€WhFHt–—2EP7‹5ŸšnS…TfA‰lqxƒC‘wg‚84o0jyVZr›YuŠB„DUIJœˆzkKNeM1RGp‡6†iQs',...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/reports/waybill.php

Size: 252.00 B Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/waybill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/reports/order_form.php

Size: 258.00 B Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/order_form.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/reports/factura.php

Size: 252.00 B Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/factura.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/reports/invoice.php

Size: 252.00 B Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/reports/invoice.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/general/sale_report_helper.php

Size: 109.98 kB Created: 2023-03-11 16:37:34 Modified: 2023-11-27 14:53:28 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 973 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/install/version.php")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( 'function ___dbCastIntToChar($dbtype, $param)''{''   $result = $param;''   if (ToLower($dbtype) === "mssql")''   {''       $result = "CAST(".$param." AS VARCHAR)";''   }''   return $result;''}' ); } if (self::$bUsePriceTypesColumns) { foreach (self::$priceTypes as $id => $info) { if ($info['selected'] === true) { $fieldName 'PRICE_TYPE_'.$id$runtime[$fieldName] = array( 'data_type' => 'string''expression' => array('
                (SELECT '
.$DB->Concat(___dbCastIntToChar($DBType...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/general/discount.php

Size: 53.68 kB Created: 2023-03-11 16:37:34 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$checkOrder='.$strUnpack.';'); if (!is_callable($checkOrder)) return false$boolRes $checkOrder($arOrder); unset($checkOrder); return $boolRes; } protected function __ApplyActions(&$arOrder$strActions) { $applyOrder null; if (!empty($strActions)) { eval('$applyOrder='.$strActions.';'); if (is_callable($applyOrder)) $applyOrder($arOrder); } } protected static function __ConvertOldFormat($strAction, &$arFields) { global $APPLICATION$arMsg = array(); $boolResult true$arNeedFields...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/general/order.php

Size: 105.53 kB Created: 2023-03-11 16:37:34 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tmp[] = "(1 = 2)"; else $arSqlSearch_tmp[] = (($strNegative == "Y") ? " NOT " "")."(".$arFields[$key]["FIELD"]." IN (".$val."))"; } elseif ($arFields[$key]["TYPE"] == "double") { array_walk($valscreate_function("&\$item""\$item=DoubleVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tm...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_ua/.description.php

Size: 278.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_ua/en/bill.php

Size: 193.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/en/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_ua/payment.php

Size: 275.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_ua/ru/bill.php

Size: 194.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill_ua/ru/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney/.description.php

Size: 280.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney/en/webmoney.php

Size: 203.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/en/webmoney.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney/payment.php

Size: 270.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney/ru/webmoney.php

Size: 203.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney/ru/webmoney.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_pci/.description.php

Size: 288.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_pci/en/webmoney_pci.php

Size: 219.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/en/webmoney_pci.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_pci/payment.php

Size: 278.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_pci/result.php

Size: 276.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/result.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_pci/result_rec.php

Size: 284.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/result_rec.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_pci/ru/webmoney_pci.php

Size: 219.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_pci/ru/webmoney_pci.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/binom/.description.php

Size: 274.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/binom/en/payment.php

Size: 195.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/en/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/binom/payment.php

Size: 264.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/binom/ru/payment.php

Size: 195.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/binom/ru/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex/.description.php

Size: 276.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex/en/payment.php

Size: 197.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/en/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex/payment.php

Size: 266.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex/result_rec.php

Size: 272.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/result_rec.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex/ru/payment.php

Size: 197.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex/ru/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill/.description.php

Size: 272.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill/en/bill.php

Size: 187.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/en/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill/payment.php

Size: 269.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill/ru/bill.php

Size: 188.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/bill/ru/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/payflow_pro/pre_payment.php

Size: 8.22 kB Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arPaySysResult = array( "PS_STATUS" => (($arResult["RESULT"] == 0) ? "Y" "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_SUM" => $AMT"PS_CURRENCY" => "USD""PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CL...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/payflow_pro/payment.php

Size: 9.77 kB Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $arFields = array( "PS_STATUS" => (($arResult["RESULT"]==0) ? "Y" "N"), "PS_STATUS_CODE" => $arResult["RESULT"], "PS_STATUS_DESCRIPTION" => $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"], "PS_STATUS_MESSAGE" => $arResult["PNREF"], "PS_RESPONSE_DATE" => Date(CDatabase::DateFormatToPHP(CLang::GetDateFormat("FULL"LANG))) ); $arResult["R...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/payflow_pro/action.php

Size: 5.77 kB Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($ret_com$arOutput$ret_var); $strOutput $arOutput[0]; parse_str($strOutput$arResult); if (is_array($arResult) && strlen($arResult["RESULT"])>0) { $OUTPUT_STATUS = (($arResult["RESULT"] == 0) ? "Y" "N"); $OUTPUT_STATUS_CODE $arResult["RESULT"]; $OUTPUT_STATUS_DESCRIPTION $arResult["RESPMSG"]." - ".$arResult["PREFPSMSG"]; $OUTPUT_STATUS_MESSAGE $arResult["PNREF"]; $OUTPUT_SUM $INPUT_SUM$OUTPUT_CURRENCY "USD"$OUTPUT_RESPONSE_DATE Date(CDatabase::DateFormatToPHP(CLang::...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/liqpay/result_rec.php

Size: 1.31 kB Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['operation_xml'])

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/sberbank_new/.description.php

Size: 288.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank_new/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/sberbank_new/payment.php

Size: 278.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank_new/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex_3x/.description.php

Size: 282.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex_3x/en/payment.php

Size: 203.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/en/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex_3x/payment.php

Size: 272.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex_3x/result_rec.php

Size: 278.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/result_rec.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/yandex_3x/ru/payment.php

Size: 203.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/yandex_3x/ru/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/sberbank/.description.php

Size: 280.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/sberbank/en/sberbank.php

Size: 203.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/en/sberbank.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/sberbank/payment.php

Size: 270.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/sberbank/ru/sberbank.php

Size: 203.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/sberbank/ru/sberbank.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/z_payment/.description.php

Size: 282.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/z_payment/en/z_payment.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/en/z_payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/z_payment/z_payment_result.php

Size: 290.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/z_payment_result.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/z_payment/payment.php

Size: 272.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/z_payment/ru/z_payment.php

Size: 207.00 B Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/z_payment/ru/z_payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/worldpay/.description.php

Size: 3.71 kB Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

System (via http://www.worldpay.com/admin). In the new window that "; $psDescription .= "opens you will need to scroll down to the section headed Installations and select the Configuration options button corresponding to the instId you are using.<br>"; $psDescription .= "You need to complete the following settings:<br>"; $psDescription .= "- <b>Callback URL</b><br>This should be set to the complete address to your callback URL (this file), hosted on your server.<br>"; $psDescription .= "You shou...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/impexbank/.description.php

Size: 282.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/impexbank/en/impexbank.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/en/impexbank.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/impexbank/payment.php

Size: 272.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/impexbank/ru/impexbank.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/impexbank/ru/impexbank.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/oshadbank/.description.php

Size: 282.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/oshadbank/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/oshadbank/payment.php

Size: 272.00 B Created: 2023-03-11 16:37:52 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/oshadbank/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/kreditpilot/.description.php

Size: 286.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/kreditpilot/en/payment.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/en/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/kreditpilot/payment.php

Size: 276.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/kreditpilot/ru/payment.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/kreditpilot/ru/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_web/.description.php

Size: 288.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_web/en/webmoney_web.php

Size: 219.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/en/webmoney_web.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_web/payment.php

Size: 278.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_web/result_rec.php

Size: 284.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/result_rec.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/webmoney_web/ru/webmoney_web.php

Size: 219.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/webmoney_web/ru/webmoney_web.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_la/.description.php

Size: 281.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_la/en/bill.php

Size: 193.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/en/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_la/payment.php

Size: 275.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_la/la/bill.php

Size: 194.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/la/payment/bill_la/la/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/post/.description.php

Size: 272.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/post/en/post.php

Size: 187.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/en/post.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/post/payment.php

Size: 262.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/post/ru/post.php

Size: 187.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/post/ru/post.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/moneymail/.description.php

Size: 282.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/moneymail/en/payment.php

Size: 203.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/en/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/moneymail/payment.php

Size: 273.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/moneymail/result.php

Size: 270.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/result.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/moneymail/result_rec.php

Size: 279.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/result_rec.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/moneymail/ru/payment.php

Size: 203.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/moneymail/ru/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paymaster/.description.php

Size: 285.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paymaster/en/paymaster.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/en/paymaster.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paymaster/payment.php

Size: 272.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paymaster/result_rec.php

Size: 278.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/result_rec.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paymaster/ru/webmoney_web.php

Size: 207.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paymaster/ru/paymaster.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/mcsecure/.description.php

Size: 280.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/mcsecure/en/payment.php

Size: 201.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/en/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/mcsecure/payment.php

Size: 270.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/mcsecure/ru/payment.php

Size: 201.00 B Created: 2023-03-11 16:37:51 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/mcsecure/ru/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paycash/.description.php

Size: 278.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paycash/en/paycash.php

Size: 199.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/en/paycash.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paycash/payment.php

Size: 268.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/paycash/ru/paycash.php

Size: 199.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/payment/paycash/ru/paycash.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_de/.description.php

Size: 281.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_de/en/bill.php

Size: 193.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/en/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_de/payment.php

Size: 275.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/payment.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/payment/bill_de/ru/bill.php

Size: 194.00 B Created: 2023-03-11 16:37:50 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/de/payment/bill_de/ru/bill.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/ru/payment/yandex_3x/ru/payment.php

Size: 3.15 kB Created: 2023-03-11 16:37:34 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function eval Line: 49 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
                
BX('https_check_result').innerHTML '&nbsp;' res['text'];

                
BX.removeClass(BX('https_check_result'), 'https_check_success');
                
BX.removeClass(BX('https_check_result'), 'https_check_fail');

                if (
res['status'] == 'ok')
                    
BX.addClass(BX('https_check_result'), 'https_check_success');
                else
                    
BX.addClass(BX('https_check_result'), 'https_check_fail');
            });
        };
        
checkHTTPS()

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/discount_preset_list.php

Size: 11.20 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 31 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*close*/

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/basket_admin.php

Size: 21.62 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' ),
                    
params res['params'];

                if (
params["id"])
                    
BX('filter_product_id').value params["id"];

                if (
params["name"])
                {
                    
el BX("product_name_alt");
                    if(
el)
                        
el.innerHTML params["name"];
                }
            }

            function 
showProductSearchDialog()
            {
                var 
popup makeProductSearchDialog({
                    
caller'basket_admin',
                    
lang'<?=LANGUAGE_ID?>',
                    
callback'getProductData'
                
});
                
popup.Show();
            }

            function 
makeProductSearchDialog(pa...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/order_new.php

Size: 274.83 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

            if (
rss["status"] == "ok")
            {
                
BX('CART_FIX').value'N';

                var 
userEl BX("user_id");
                var 
orderID '<?=$ID?>';

                
locationID rss["location_id"];
                
locationZipID rss["location_zip_id"];

                
insertHtmlResult(document.getElementById("buyer_type_change"), rss['buyertype']);
                
insertHtmlResult(document.getElementById("buyer_type_delivery"), rss['buyerdelivery']);

                <?if(
CSaleLocation::isLocationProEnabled()):?>
                    initZipHandling();
                <?endif?...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/affiliate_calc.php

Size: 13.38 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 234 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin_after.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/ymarket.php

Size: 22.25 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
                                
BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>').innerHTML '&nbsp;' res['text'];

                                
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success');
                                
BX.removeClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_fail');

                                if (
res['status'] == 'ok')
                                    
BX.addClass(BX('https_check_result_<?=CUtil::JSEscape($SITE_ID)?>'), 'https_check_success');
                                else
                                    
BX.addClas...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/report_construct.php

Size: 22.90 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('('+res+')');
                                        
filters BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true);
                                        for(
i in filters)
                                        {
                                            if (
filters[i].tagName == 'SELECT')
                                            {
                                                
filterType filters[i].getAttribute('tid');
                                                if (
filterType)
                                                {
                                                    
fRewriteSelectFromArray(filters[i], res[filterType], '');
                                                }
                                                
filters[i].value '';
                                            }
                                        }
                                    }
                                }
                                function ...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/crm.php

Size: 22.64 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 433 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/.access.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/stat_graph_money.php

Size: 10.14 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 121 Warning

Double var technique is usually used for the obfuscation of malicious code

${$filterLine}

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/1c_admin_profile.php

Size: 16.50 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var cur_type = ''; if (typeof(param_" pkey "_type_" ind ") == 'string') cur_type = param_" pkey "_type_" ind ";");
    eval(
"var cur_val = ''; if (typeof(param_" pkey "_value_" ind ") == 'string') cur_val = param_" pkey "_value_" ind ";");
    eval(
"var cur_name = ''; if (typeof(param_" pkey "_name_" ind ") == 'string') cur_name = param_" pkey "_name_" ind ";");

    if(
cur_name.length 0)
    {
        
num pkey.substr(pkey.lastIndexOf('_')+1);
        
src BX("...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/delivery.php

Size: 11.67 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.find_form.filter_lang");
                
filter_order_price_from = eval("document.find_form.filter_order_price_from");
                
filter_order_price_to = eval("document.find_form.filter_order_price_to");
                
f_currency = eval("document.find_form.f_currency");

                var 
iesum;
                if (
parseInt(filter_lang.selectedIndex)==0)
                {
                    
filter_order_price_from.disabled true;
                    
filter_order_price_to.disabled true;
                    
f_currency.value "";
                }
                else
                {
                    
filter_order_price_from.disa...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/order_detail.php

Size: 153.23 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 1363 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$customOrderView)

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );
                                                
BX.closeWait();

                                                if (!!
rs.STATUS_ERR && true == rs.STATUS_ERR)
                                                {
                                                    var 
obStatusErr BX('change_status_err');
                                                    if (!!
obStatusErr)
                                                    {
                                                        
obStatusErr.innerHTML rs.STATUS_ERR_MESS;
                                                        
obStatusErr.style.display 'inline-block';
                                                    }
                                                }
                                                else
                                                {
                                                    if (
BX('date_status_change') && rs['DATE_STATUS'] && rs['DATE_STATUS'].length 0)
            ...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/discount_edit.php

Size: 28.93 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Dangers: 2
DescriptionMatch

Exploit execution Line: 118 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['CONDITIONS'])

Exploit execution Line: 163 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['ACTIONS'])

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/buyers.php

Size: 17.29 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 331 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*BUYER*/

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/report_view.php

Size: 23.09 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('('+res+')');
                                        
filters BX.findChildren(filterContainer, {class: 'sale-report-site-dependent'}, true);
                                        for(
i in filters)
                                        {
                                            if (
filters[i].tagName == 'SELECT')
                                            {
                                                
filterType filters[i].getAttribute('tid');
                                                if (
filterType)
                                                {
                                                    
fRewriteSelectFromArray(filters[i], res[filterType], '');
                                                }
                                            }
                                        }
                                    }
                                }
                                function 
fRewriteSelectFromArray(selectdat...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/location_edit.php

Size: 21.15 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.fform.COUNTRY_ID");
                
CHANGE_COUNTRY = eval("document.fform.CHANGE_COUNTRY");

                <?if (
$ID>0):?>
                if (parseInt(COUNTRY_LIST.selectedIndex)==0)
                {
                    CHANGE_COUNTRY.checked = false;
                }
                <?endif;?>

                if (parseInt(COUNTRY_LIST.selectedIndex)==0 <?if ($ID>0) echo "|| CHANGE_COUNTRY.checked";?>)
                {
                    SetEnabled(true);
                }
                else
                {
                    SetEnabled(false);
                }
            }
            </script>

            <select name="COUNTRY_ID" OnChange="SetContact()">
                <option value="...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/yandexinvoice_settings.php

Size: 8.78 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 2
DescriptionMatch

Function proc_close Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($process); $dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId); if ($dbRes->fetch()) \Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey)); else \Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId'PKEY' => $privateKey)); } else { $errorMsg Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIGURED'); } if ($errorMsg === ''LocalRedirect($APPLICATION->GetCurPage()."?pay_system_id=".$id."&lang=".LANG...

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open($command$descriptorSpec$pipes); $privateKey stream_get_contents($pipes[1]); $return_value proc_close($process); $dbRes = \Bitrix\Sale\Internals\YandexSettingsTable::getById($shopId); if ($dbRes->fetch()) \Bitrix\Sale\Internals\YandexSettingsTable::update($shopId, array('PKEY' => $privateKey)); else \Bitrix\Sale\Internals\YandexSettingsTable::add(array('SHOP_ID' => $shopId'PKEY' => $privateKey)); } else { $errorMsg Loc::getMessage('SALE_YANDEX_INVOICE_SETTINGS_ALREADY_CONFIG...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/admin/affiliate_plan_edit.php

Size: 23.97 kB Created: 2023-03-11 16:37:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.form1.MODULE_ID_" cnt);
                if (!
m)
                    return;

                if (
m[m.selectedIndex].value == "catalog")
                    
ShowHideSectionBox(cnttrue);
                else
                    
ShowHideSectionBox(cntfalse);
            }


            var 
itm_id = new Object();
            var 
itm_name = new Object();

            function 
ChlistIBlock(cntn_id)
            {
                var 
max_lev itm_lev;
                var 
nex document.form1["SECTION_SELECTOR_LEVEL_" cnt "[0]"];
                var 
iBlock = eval("document.form1.SECTION_IBLOCK_ID_" cnt);
                var 
iBlockID iBlock[iBl...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/include.php

Size: 54.59 kB Created: 2023-03-11 16:37:49 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 774 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/ru/include.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/.default/template.php

Size: 15.64 kB Created: 2023-03-11 16:38:04 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.location.import/templates/admin/template.php

Size: 12.30 kB Created: 2023-03-11 16:38:04 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Sign 7830f7a6 Line: 11 Dangerous

Malware Signature (hash: 7830f7a6)

nc-l

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.notice.product/templates/.default/template.php

Size: 7.41 kB Created: 2023-03-11 16:38:11 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function eval Line: 130 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+res+')' );

                            if (
rs['ERRORS'].length 0)
                            {
                                if (
rs['ERRORS'] == 'NOTIFY_ERR_NULL')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_NULL')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_CAPTHA')
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_CAPTHA')?>';
                                else if (
rs['ERRORS'] == 'NOTIFY_ERR_MAIL_EXIST')
                                {
                                    
BX('popup_n_error').innerHTML '<?=GetMessageJS('NOTIFY_ERR_MAIL_BUYERS_EXIST')?>';
                        ...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.basket.basket/templates/.default/template.php

Size: 8.29 kB Created: 2023-03-11 16:38:00 Modified: 2023-11-27 14:53:28 Dangers: 4
DescriptionMatch

Exploit execution Line: 142 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items.php")

Exploit execution Line: 143 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delayed.php")

Exploit execution Line: 144 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_subscribed.php")

Exploit execution Line: 145 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_not_available.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.basket.order.ajax/component.php

Size: 38.77 kB Created: 2023-03-11 16:38:09 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 556 Dangerous

Malware Signature (hash: 11413268)

eVal($_POST

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.basket.order.ajax/templates/.default/template.php

Size: 5.78 kB Created: 2023-03-11 16:38:09 Modified: 2023-11-27 14:53:28 Dangers: 7
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_confirm.php")

Exploit execution Line: 27 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items.php")

Exploit execution Line: 28 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_delay.php")

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_notavail.php")

Exploit execution Line: 30 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items_subscribe.php")

Exploit execution Line: 44 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_person_type.php")

Exploit execution Line: 45 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_props.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.order.full/templates/.default/template.php

Size: 5.19 kB Created: 2023-03-11 16:37:56 Modified: 2023-11-27 14:53:29 Dangers: 7
DescriptionMatch

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step1.php")

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 71 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step2.php")

Exploit execution Line: 73 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step3.php")

Exploit execution Line: 75 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step4.php")

Exploit execution Line: 77 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step5.php")

Exploit execution Line: 79 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/step6.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.location.selector.system/templates/.default/template.php

Size: 17.63 kB Created: 2023-03-11 16:38:04 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system(<?=CUtil::PhpToJSObject(array( 'scope' => 'slss-'.intval($arResult['RANDOM_TAG']), 'source' => $component->getPath().'/get.php''query' => array( 'BEHAVIOUR' => array( 'LANGUAGE_ID' => LANGUAGE_ID ), ), 'editUrl' => '?'.implode('&'$urlComponents), 'parentTagId' => intval($arResult['RANDOM_TAG']), 'useCodes' => $arResult['USE_CODES'], 'types' => $arResult['TYPES'], 'startSearchLen' => $component::START_SEARCH_LEN'pageSize' => $component::PAGE_SIZE'hugeTailLen' => $component::HUGE_TA...

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/.default/ajax.php

Size: 0.99 kB Created: 2023-03-11 16:38:01 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/components/bitrix/sale.ajax.delivery.calculator/templates/input/ajax.php

Size: 864.00 B Created: 2023-03-11 16:38:01 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 15 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/sale/install/sample/mp3/download_private.php

Size: 4.94 kB Created: 2023-03-11 16:38:15 Modified: 2023-11-27 14:53:29 Warns: 1 Dangers: 1
DescriptionMatch

Exploit double_var2 Line: 13 Warning

Double var technique is usually used for the obfuscation of malicious code

${$arr2[0]}

Exploit execution Line: 177 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/404.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/lib/internals/controller.php

Size: 9.87 kB Created: 2023-03-11 16:40:15 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_after.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { try { if($this->request->isPost()) { \CUtil::jSPostUnescape(); $this->request->addFilter(new PostDecodeFilter); } $this->resolveAction(); $this->checkAction(); $this->checkRequiredModules(); if(!$this->prepareParams()) { $this->sendJsonErrorResponse(); } if($this->processBeforeAction($this->getAction()) !== false) { $this->runAction(); } } catch(\Exception $e) { $this->runProcessingException($e); } } protected function getUser() { global $USER; return $USER; } protected function sendJso...

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_list_edit.php

Size: 1.39 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_list_view.php

Size: 1.92 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_bizproc_workflow_edit.php

Size: 1.68 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_bizproc_workflow_admin.php

Size: 2.94 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 7 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_list_element_edit.php

Size: 1.99 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_bizproc_workflow_start.php

Size: 1.38 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_list_sections.php

Size: 1.44 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_lists.php

Size: 1.35 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_bizproc_task.php

Size: 1.53 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_list_fields.php

Size: 1.45 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_list_field_edit.php

Size: 1.51 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/socnet/group_bizproc_log.php

Size: 1.33 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_menu.php")

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/components/bitrix/socialnetwork_group/templates/.default/util_group_profile.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/install/components/bitrix/lists.element.edit/component.php

Size: 31.11 kB Created: 2023-03-11 16:40:17 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 500 Dangerous

Malware Signature (hash: 11413268)

eval($_POST

/var/www/allstarsO/allstars.ua/bitrix/modules/lists/install/components/bitrix/lists.export.excel/class.php

Size: 17.74 kB Created: 2023-03-11 16:40:17 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 150 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/security/classes/general/user.php

Size: 7.37 kB Created: 2023-03-11 16:38:43 Modified: 2023-11-27 14:53:29 Dangers: 2
DescriptionMatch

Exploit download_remote_code2 Line: 197 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"<?include(\$_SERVER[\"DOCUMENT_ROOT\"].\"/bitrix/modules/security/options_user_settings_1.php\")

Exploit execution Line: 197 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include(\$_SERVER[\"DOCUMENT_ROOT\"].\"/bitrix/modules/security/options_user_settings_1.php\")

/var/www/allstarsO/allstars.ua/bitrix/modules/security/classes/general/iprule.php

Size: 29.94 kB Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:29 Dangers: 2
DescriptionMatch

Exploit execution Line: 1185 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/admin/security_403.php")

Exploit execution Line: 922 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/admin/security_403.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/security/classes/general/system_information.php

Size: 6.64 kB Created: 2023-03-11 16:38:43 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 312 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/security/classes/general/event.php

Size: 5.49 kB Created: 2023-03-11 16:38:43 Modified: 2023-11-27 14:53:29 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog($this->syslogPriority$message); } if ($this->isFileEngineActive) { if (!$message$message $this->messageFormatter->format($auditType$itemName$itemDescription); $message = static::sanitizeMessage($message); $message .= "\n"$savedInFile file_put_contents($this->filePath$messageFILE_APPEND) > 0; } return ($savedInDB || $savedInSyslog || $savedInFile); } public static function getSyslogPriorities() { return static::$syslogPriorities; } public static function getSyslogFaciliti...

/var/www/allstarsO/allstars.ua/bitrix/modules/security/classes/general/post_filter.php

Size: 6.95 kB Created: 2023-03-11 16:38:43 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 167 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"\n------------------------------\n\$_SERVER:\n")

/var/www/allstarsO/allstars.ua/bitrix/modules/security/classes/general/antivirus.php

Size: 43.78 kB Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 517 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($f"\n------------------------------\n\$_SERVER:\n")

/var/www/allstarsO/allstars.ua/bitrix/modules/security/install/index.php

Size: 10.88 kB Created: 2023-03-11 16:38:44 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit execution Line: 210 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/security/install/events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/security/lang/en/classes/general/tests/environment.php

Size: 3.78 kB Created: 2023-03-11 16:38:44 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 7 Dangerous

Malware Signature (hash: 11413268)

exploit

/var/www/allstarsO/allstars.ua/bitrix/modules/security/lang/en/classes/general/tests/php_configuration.php

Size: 3.91 kB Created: 2023-03-11 16:38:44 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 25 Dangerous

Malware Signature (hash: 11413268)

exploit

/var/www/allstarsO/allstars.ua/bitrix/modules/security/lang/en/admin/security_antivirus.php

Size: 2.24 kB Created: 2023-03-11 16:38:44 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 13 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/var/www/allstarsO/allstars.ua/bitrix/modules/security/lang/ua/admin/security_antivirus.php

Size: 3.02 kB Created: 2023-03-11 16:38:44 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 12 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/var/www/allstarsO/allstars.ua/bitrix/modules/security/lang/ru/admin/security_antivirus.php

Size: 3.09 kB Created: 2023-03-11 16:38:44 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit file_prepend Line: 12 Dangerous

LFI (Local File Inclusion), prepending a file at the bottom of every others PHP files, allow remote attackers to inject and execute arbitrary commands or code on the target machine

php_value auto_prepend_file

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/options.php

Size: 59.44 kB Created: 2023-03-11 16:40:13 Modified: 2023-11-27 14:53:30 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 396 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork_group/include/webdav.php

Size: 25.02 kB Created: 2023-03-11 16:39:58 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/bizproc/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork_group/include/webdav_settings.php

Size: 12.94 kB Created: 2023-03-11 16:39:58 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 258 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/components/bitrix/webdav.iblock.rights/action.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork_group/templates/.default/bitrix/search.page/tags_icons/result_modifier.php

Size: 16.66 kB Created: 2023-03-11 16:40:00 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 71 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork/include/webdav.php

Size: 22.12 kB Created: 2023-03-11 16:39:48 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/bizproc/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork/include/webdav_settings.php

Size: 11.37 kB Created: 2023-03-11 16:39:48 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 236 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/components/bitrix/webdav.iblock.rights/action.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork/templates/.default/bitrix/search.page/tags_icons/result_modifier.php

Size: 16.66 kB Created: 2023-03-11 16:39:46 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 71 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork/templates/.default/bitrix/search.page/tags_icons_user/result_modifier.php

Size: 16.12 kB Created: 2023-03-11 16:39:46 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 67 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork_user/include/webdav.php

Size: 25.44 kB Created: 2023-03-11 16:39:49 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 46 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/bizproc/templates/'.$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork_user/include/webdav_settings.php

Size: 13.03 kB Created: 2023-03-11 16:39:49 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 270 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/components/bitrix/webdav.iblock.rights/action.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/components/bitrix/socialnetwork_user/templates/.default/bitrix/search.page/tags_icons_user/result_modifier.php

Size: 16.12 kB Created: 2023-03-11 16:39:50 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 67 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->GetFolder()

/var/www/allstarsO/allstars.ua/bitrix/modules/socialnetwork/install/index.php

Size: 40.19 kB Created: 2023-03-11 16:40:11 Modified: 2023-11-27 14:53:30 Dangers: 2
DescriptionMatch

Exploit execution Line: 843 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/socialnetwork/install/events/set_events.php")

Exploit execution Line: 900 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/socialnetwork/install/install_demo.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/nokeep.php

Size: 606.00 B Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/options.php

Size: 37.59 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 378 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($func); } } } } COption::SetOptionString($module_id"IP_LOOKUP_CLASS"$IP_LOOKUP_CLASS); COption::SetOptionString($module_id"ADV_EVENTS_DEFAULT"$ADV_EVENTS_DEFAULT); COption::SetOptionString($module_id"USE_AUTO_OPTIMIZE"$USE_AUTO_OPTIMIZE); InitBVar($recount_base_currency); if ($recount_base_currency=="Y"CStatistics::RecountBaseCurrency($BASE_CURRENCY); COption::SetOptionString($module_id"BASE_CURRENCY"$BASE_CURRENCY); $arr = array(); $arr preg_split("/[\n\r]+/"$BROWSERS...

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/stat_tools.php

Size: 45.08 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 513 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/classes/general/traffic.php

Size: 2.67 kB Created: 2023-03-11 16:43:02 Modified: 2023-11-27 14:53:30 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 61 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/ip_tools.php

Size: 8.18 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 67 Warning

Double var technique is usually used for the obfuscation of malicious code

${$value}

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/adv_graph_legend.php

Size: 813.00 B Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/graph_legend.php

Size: 1.05 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/attentiveness_graph.php

Size: 3.35 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/country_graph.php

Size: 3.18 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/adv_graph_1.php

Size: 5.62 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/event_diagram.php

Size: 1.76 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/attentiveness_diagram.php

Size: 1.66 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/country_diagram.php

Size: 1.77 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/city_list.php

Size: 10.43 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/searcher_diagram_list.php

Size: 6.83 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 8 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/event_diagram_list.php

Size: 7.14 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 18 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/visit_section_list.php

Size: 15.00 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 4 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/section_graph.php

Size: 3.90 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/traffic.php

Size: 14.76 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 16 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/visit_section_diagram.php

Size: 2.03 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 8 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/adv_graph_list.php

Size: 13.67 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/searcher_graph_list.php

Size: 6.89 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/searcher_graph.php

Size: 3.32 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/adv_graph_2.php

Size: 4.21 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/traffic_graph.php

Size: 7.94 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/event_graph.php

Size: 3.39 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/city_diagram.php

Size: 1.44 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/section_graph_list.php

Size: 6.06 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/attentiveness_list.php

Size: 7.52 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/searcher_diagram.php

Size: 1.57 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/adv_analysis_graph.php

Size: 4.21 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 14 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/event_graph_list.php

Size: 8.17 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 18 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/country_list.php

Size: 14.00 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/adv_analysis.php

Size: 13.51 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/admin/city_graph.php

Size: 3.13 kB Created: 2023-03-11 16:42:59 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/install/gadgets/bitrix/admin_stat/index.php

Size: 11.57 kB Created: 2023-03-11 16:43:02 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/statistic/install/index.php

Size: 13.90 kB Created: 2023-03-11 16:43:02 Modified: 2023-11-27 14:53:30 Dangers: 1
DescriptionMatch

Exploit execution Line: 237 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/statistic/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrix.sitepersonal/install/wizards/bitrix/demo_personal/site/services/main/template.php

Size: 2.93 kB Created: 2023-03-11 16:38:17 Modified: 2023-11-27 14:53:22 Dangers: 1
DescriptionMatch

Exploit execution Line: 44 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/mail/classes/general/mail.php

Size: 99.50 kB Created: 2023-03-11 16:39:39 Modified: 2023-11-27 14:53:26 Warns: 2 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 2458 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($code)

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$m'"return CMailHeader::ConvertHeader(\$m[1], \$m[2], \$m[3], '".AddSlashes($charset_to)."');"), $str ); } return $str; } function Parse($message_header$charset) { if(preg_match("'content-type:.*?charset=([^\r\n;]+)'is"$message_header$res)) $this->charset strtolower(trim($res[1], ' "')); elseif($this->charset=='' && defined("BX_MAIL_DEFAULT_CHARSET")) $this->charset BX_MAIL_DEFAULT_CHARSET$ar_message_header_tmp explode("\r\n"$message_header); $n = -1$bConvert...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($code); ob_end_clean(); if($php_errormsg != ""CMailError::SetError("B_MAIL_ERR_PHP"GetMessage("MAIL_CL_ERR_IN_PHP").$field_name.". (".$php_errormsg.")"); $php_errormsg $php_errormsg_previni_set("track_errors"$prev); } function CheckFields($arFields$ID=false) { $err_cnt CMailError::ErrCount(); $arMsg = Array(); if(is_set($arFields"NAME") && strlen($arFields["NAME"])<1) { CMailError::SetError("B_MAIL_ERR_NAME"GetMessage("MAIL_CL_ERR_NAME")." \"".GetMessage("MAIL_CL_NAME")."\...

/var/www/allstarsO/allstars.ua/bitrix/modules/mail/admin/mail_smtpd_manager.php

Size: 2.44 kB Created: 2023-03-11 16:39:39 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($cmd$op); } } if (strlen($startErrorMessage) <= 0$res "success"; else $res $startErrorMessage; break; case 'stop'$CACHE_MANAGER->Read(3600000$cache_id "smtpd_stop"); $CACHE_MANAGER->Set($cache_idtrue); break; case 'stats'$res false; if($CACHE_MANAGER->Read(3600000$cache_id "smtpd_stats")) { $res $CACHE_MANAGER->Get($cache_id); $res["uptime"] = time() - $res["started"]; } break; } echo CUtil::PhpToJSObject($resfalse); ?>
<? 
require($_SERVER["DOCUMENT_ROOT"].BX_ROO...

/var/www/allstarsO/allstars.ua/bitrix/modules/mail/admin/mail_message_view.php

Size: 11.30 kB Created: 2023-03-11 16:39:39 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$m'"return _ConvReplies(\$m[2], \$m[4]);"), TxtToHTML($dbr_arr["BODY"]))?></td>
    </tr>
    <? if($dbr_arr["ATTACHMENTS"]>0): $dbr_attach CMailAttachment::GetList(Array("NAME"=>"ASC""ID"=>"ASC"), Array("MESSAGE_ID"=>$dbr_arr["ID"])); ?>
    <tr>
        <td><?echo GetMessage("MAIL_MSG_VIEW_ATTACHMENTS")?></td>
        <td>
        <?while($dbr_attach_arr $dbr_attach->GetNext()):?>
            <a target="_blank" href="mail_attachment_view.php?lang=<?=LANG?>&amp;ID=<?=$dbr_attach_arr["ID"]?>"><?=(strlen($d...

/var/www/allstarsO/allstars.ua/bitrix/modules/ldap/options.php

Size: 5.41 kB Created: 2023-03-11 16:37:33 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 78 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/var/www/allstarsO/allstars.ua/bitrix/modules/ldap/admin/ldap_server_edit.php

Size: 30.89 kB Created: 2023-03-11 16:37:34 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''$a=ToUpper($a);$b=ToUpper($b); if($a==$b) return 0; return $a>$b?1:-1;')); } if(!is_array($arLDAPGroups) || count($arLDAPGroups)<=0):?>
    <script type="text/javascript">
    function CheckNAttr()
    {
        if(document.getElementById("GROUP_FILTER").value.length<=0 ||
            document.getElementById("GROUP_ID_ATTR").value.length<=0 ||
            document.getElementById("GROUP_NAME_ATTR").value.length<=0
            )
        {
            alert('<?=GetMessage("LDAP_EDIT_WARN")?>');
            return false;
        }

        return tr...

/var/www/allstarsO/allstars.ua/bitrix/modules/wiki/options.php

Size: 6.00 kB Created: 2023-03-11 16:41:56 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 75 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/var/www/allstarsO/allstars.ua/bitrix/modules/wiki/install/components/bitrix/wiki.edit/templates/.default/template.php

Size: 10.11 kB Created: 2023-03-11 16:41:54 Modified: 2023-11-27 14:53:31 Dangers: 2
DescriptionMatch

Exploit execution Line: 21 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$templateFolder.'/dialogs_content.php')

Exploit execution Line: 22 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$templateFolder.'/script.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/wiki/install/components/bitrix/wiki.edit/templates/.default/dialogs_content.php

Size: 10.70 kB Created: 2023-03-11 16:41:54 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 365 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$templateFolder.'/lhe_custom.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/learning/admin/learn_unilesson_edit.php

Size: 48.10 kB Created: 2023-03-11 16:39:22 Modified: 2023-11-27 14:53:26 Warns: 2
DescriptionMatch

Exploit double_var2 Line: 508 Warning

Double var technique is usually used for the obfuscation of malicious code

${$varName}

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('JSConfig = ' b4); } catch (e) { JSConfig false; }
            if (!
id || !JSConfig)
                return 
'';

            var 
= (parseInt(JSConfig.width) || 50);
            var 
= (parseInt(JSConfig.height) || 25);

            var 
arTagParams = {fileJSConfig.file};
            var 
bxTag =  pMainObj.GetBxTag(id);

            if (
bxTag && bxTag && bxTag.tag == "media")
            {
                
arTagParams.id id;
            }
            return 
'<img  id="' pMainObj.SetBxTag(false, {tag'media'paramsarTagParams}) + '" src="/bitrix/images/1.gif" style="border: 1px sol...

/var/www/allstarsO/allstars.ua/bitrix/modules/learning/admin/learn_course_edit.php

Size: 21.36 kB Created: 2023-03-11 16:39:21 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 341 Warning

Double var technique is usually used for the obfuscation of malicious code

${$varName}

/var/www/allstarsO/allstars.ua/bitrix/modules/learning/admin/learn_question_edit.php

Size: 38.87 kB Created: 2023-03-11 16:39:21 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('JSConfig = ' b4); } catch (e) { JSConfig false; }
            if (!
id || !JSConfig)
                return 
'';

            var 
= (parseInt(JSConfig.width) || 50);
            var 
= (parseInt(JSConfig.height) || 25);

            var 
arTagParams = {fileJSConfig.file};
            var 
bxTag =  pMainObj.GetBxTag(id);

            if (
bxTag && bxTag && bxTag.tag == "media")
            {
                
arTagParams.id id;
            }
            return 
'<img  id="' pMainObj.SetBxTag(false, {tag'media'paramsarTagParams}) + '" src="/bitrix/images/1.gif" style="border: 1px sol...

/var/www/allstarsO/allstars.ua/bitrix/modules/learning/install/index.php

Size: 18.45 kB Created: 2023-03-11 16:39:17 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 176 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/learning/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/socialservices/classes/general/authmanager.php

Size: 42.56 kB Created: 2023-03-11 16:39:37 Modified: 2023-11-27 14:53:30 Dangers: 2
DescriptionMatch

Exploit execution Line: 1484 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST[self::OAUTH_PACK_PARAM])

Exploit nano Line: 193 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$service["CLASS"]()

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/options.php

Size: 83.81 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
            var 
el BX(res);
            
BX(res).setAttribute('class''adm-btn');
            if (
el.bxwaiter && el.bxwaiter.parentNode)
            {
                
el.bxwaiter.parentNode.removeChild(el.bxwaiter);
                
el.bxwaiter null;
            }
            
el.disabled false;
        }
    }
</
script>
<? } 
$systemTabControl = new CAdminTabControl("tabControl2"$aTabstruetrue); $systemTabControl->Begin(); $systemTabControl->BeginNextTab(); ?><tr><td align="left"><? $arAgentInfo false$rsAgents CAgent::GetList(array(),array('...

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/general/discount.php

Size: 117.28 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('return '.$strUnpack.';'); } protected function __ConvertOldConditions($strAction, &$arFields) { $strAction ToUpper($strAction); if (!is_set($arFields'CONDITIONS')) { $arConditions = array( 'CLASS_ID' => 'CondGroup''DATA' => array( 'All' => 'AND''True' => 'True', ), 'CHILDREN' => array(), ); $intEntityCount 0$arIBlockList self::__ConvertOldOneEntity($arFields'IBLOCK_IDS'); if (!empty($arIBlockList)) { $intEntityCount++; } $arSectionList self::__ConvertOldOneEntity($arField...

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/general/catalog_import.php

Size: 10.27 kB Created: 2023-03-11 16:39:07 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 322 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/general/catalog_export.php

Size: 10.15 kB Created: 2023-03-11 16:39:07 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 315 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load_import/cron_frame.php

Size: 3.51 kB Created: 2023-03-11 16:39:07 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 96 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load_import/commerceml_g_run.php

Size: 61.72 kB Created: 2023-03-11 16:39:07 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 33 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/php_interface/include/1c_mutator.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load_import/commerceml_run.php

Size: 30.33 kB Created: 2023-03-11 16:39:07 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/php_interface/include/1c_mutator.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load/yandex_run.php

Size: 53.55 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:24 Dangers: 4
DescriptionMatch

Exploit download_remote_code2 Line: 897 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'if (!isset($_GET["referer1"])

Exploit download_remote_code2 Line: 898 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'$strReferer1 = htmlspecialchars($_GET["referer1"])

Exploit download_remote_code2 Line: 899 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'if (!isset($_GET["referer2"])

Exploit download_remote_code2 Line: 900 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'$strReferer2 = htmlspecialchars($_GET["referer2"])

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load/yandex_detail.php

Size: 31.32 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 497 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['XML_DATA'])

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load/cron_frame.php

Size: 3.43 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 93 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/load/yandex_simple_run.php

Size: 12.09 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:24 Dangers: 4
DescriptionMatch

Exploit download_remote_code2 Line: 90 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<?if (!isset($_GET["referer1"])

Exploit download_remote_code2 Line: 97 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<? $strReferer1 = htmlspecialchars($_GET["referer1"])

Exploit download_remote_code2 Line: 98 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<?if (!isset($_GET["referer2"])

Exploit download_remote_code2 Line: 99 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp'<? $strReferer2 = htmlspecialchars($_GET["referer2"])

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/admin/cat_discount_edit.php

Size: 25.96 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 87 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_POST['CONDITIONS'])

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/admin/cat_product_search.php

Size: 9.63 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("window.opener.document.<?= $form_name ?>.<?= $field_name ?>");
        if(
el)
            
el.value id;
        <?if (
strlen($field_name_name) > 0):?>
            el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_name ?>");
            if(el)
                el.value = name;
        <?endif;?>
        <?if (strlen($field_name_url) > 0):?>
            el = eval("window.opener.document.<?= $form_name ?>.<?= $field_name_url ?>");
            if(el)
                el.value = url;
        <?endif;?>
        <?if (strlen($alt_name) > 0):?>
            el = window.opener.document.getEleme...

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/admin/export_setup.php

Size: 62.79 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:23 Warns: 1 Dangers: 5
DescriptionMatch

Exploit execution Line: 261 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 265 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_SETUP"])

Exploit execution Line: 270 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin.php")

Exploit execution Line: 300 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_RUN"])

Exploit execution Line: 375 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin_after.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"$arRetval$return_var); if (intval($return_var)!=0) { $strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n"; if (is_array($arRetval) && !empty($arRetval)) { $strErrorMessage .= implode("\n"$arRetval)."\n"; } else { $strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n"; } } } } } if (strlen($strErrorMessage)<=0) { LocalRedirect($APPLICATION->GetCurPage()."?lang=".urlencode(LANGUAGE_ID)."&success_export=Y"); } } el...

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/admin/cat_store_document_edit.php

Size: 42.45 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:23 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval( '('+result+')' );
            if(
res['id'] > 0)
            {
                
res['quantity'] = 1;
                
obProductAdd BX('productAdd');
                if (!!
obProductAdd)
                    
obProductAdd.disabled true;
                
addRow(nullresnullarBarCodes);
            }
        }
    }

    function 
enterBarcodes(id)
    {
        var 
amount;
        if(
BX('CAT_DOC_AMOUNT_HIDDEN_'+id))
            
amount parseInt(BX('CAT_DOC_AMOUNT_HIDDEN_'+id).value10);
        else
            
amount 0;
        if(
isNaN(amount))
            
amount 0;
        
maxId amount;

        var
            
content BX.create('DIV', {
                
props: {i...

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/admin/import_setup.php

Size: 60.54 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:23 Warns: 1 Dangers: 5
DescriptionMatch

Exploit execution Line: 261 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_SETUP"])

Exploit execution Line: 269 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 273 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin.php")

Exploit execution Line: 303 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arReportsList[$strActFileName]["FILE_RUN"])

Exploit execution Line: 384 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_admin_after.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("crontab ".$_SERVER["DOCUMENT_ROOT"]."/bitrix/crontab/crontab.cfg"$arRetval$return_var); if (intval($return_var)!=0) { $strErrorMessage .= GetMessage("CES_ERROR_ADD2CRON")." \n"; if (is_array($arRetval) && !empty($arRetval)) { $strErrorMessage .= implode("\n"$arRetval)."\n"; } else { $strErrorMessage .= GetMessage("CES_ERROR_UNKNOWN")."\n"; } } } } } if (strlen($strErrorMessage)<=0) { LocalRedirect($APPLICATION->GetCurPage()."?lang=".urlencode(LANGUAGE_ID)."&success_import=Y"); } } el...

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/tools/iblock_subelement_generator.php

Size: 29.82 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(arFileProperties),
            
id 0;
        if(
BX('ib_seg_max_property_id'))
        {
            
id BX('ib_seg_max_property_id').value;
            if(
id >= obPropertyTable.AR_FILE_PROPERTIES.length 2)
            {
                return;
            }
            
BX('ib_seg_max_property_id').value Number(BX('ib_seg_max_property_id').value) + 1;
        }
        
obPropertyTable.SELECTED_PROPERTIES[id] = 'DETAIL';

        var 
propertySpan BX('ib_seg_property_span');
        if(
propertySpan)
        {
            var 
options = [];
            for(var 
key in fileProperties)
            {
                if(
fileProperties....

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/load/cron_frame.php

Size: 3.27 kB Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 86 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$strFile)

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/admin/cat_section_admin.php

Size: 129.00 B Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/admin/cat_product_list.php

Size: 126.00 B Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_list_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/admin/cat_section_edit.php

Size: 128.00 B Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_section_edit.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/admin/cat_product_admin.php

Size: 129.00 B Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/admin/cat_product_edit.php

Size: 128.00 B Created: 2023-03-11 16:39:08 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/iblock/admin/iblock_element_edit.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/catalog/install/index.php

Size: 25.48 kB Created: 2023-03-11 16:39:13 Modified: 2023-11-27 14:53:23 Dangers: 1
DescriptionMatch

Exploit execution Line: 229 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/catalog/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/highloadblock/lib/highloadblock.php

Size: 15.35 kB Created: 2023-03-11 16:43:36 Modified: 2023-11-27 14:53:25 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($eval); $entity $entity_data_class::getEntity(); $uFields $USER_FIELD_MANAGER->getUserFields('HLBLOCK_'.$hlblock['ID']); foreach ($uFields as $uField) { if ($uField['MULTIPLE'] == 'N') { $field $USER_FIELD_MANAGER->getEntityField($uField$uField['FIELD_NAME']); $entity->addField($field); foreach ($USER_FIELD_MANAGER->getEntityReferences($uField$field) as $reference) { $entity->addField($reference); } } else { static::compileUtmEntity($entity$uField); } } } return Entity\Base::get...

/var/www/allstarsO/allstars.ua/bitrix/modules/workflow/classes/mysql/workflow.php

Size: 17.53 kB Created: 2023-03-11 16:39:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/workflow/classes/general/status.php

Size: 9.39 kB Created: 2023-03-11 16:39:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/workflow/classes/general/workflow.php

Size: 28.98 kB Created: 2023-03-11 16:39:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/workflow/install/index.php

Size: 6.52 kB Created: 2023-03-11 16:39:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 133 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/workflow/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/report/install/components/bitrix/report.view/templates/admin/template.php

Size: 55.04 kB Created: 2023-03-11 16:40:14 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('response = ' data);
                if (
response)
                {
                    if (
response.imageData)
                    {
                        if (
response.imageData.substr(0,10) === 'data:image')
                        {
                            
img BX('report-chart-image');
                            
img.src response.imageData;
                            if (
response.legendInfo)
                            {
                                var 
legendContainer BX('report-chart-legend-container');
                                var 
legendRowExample BX('report-chart-legend-row-example');
                                var 
chartType requestData['type'];
                                var 
legendNewRowlegendSticklegend...

/var/www/allstarsO/allstars.ua/bitrix/modules/report/install/components/bitrix/report.construct/templates/.default/template.php

Size: 37.43 kB Created: 2023-03-11 16:40:14 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/var/www/allstarsO/allstars.ua/bitrix/modules/report/install/components/bitrix/report.construct/templates/admin/template.php

Size: 39.88 kB Created: 2023-03-11 16:40:14 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ySelects[i].name))
            {
                
colId match[1];
                if (
colId !== null && yColumnsIndexes[colId] !== null)
                    
setSelectValue(ySelects[i], yColumnsIndexes[colId]);
            }
        }
        var 
chartCheckbox BX('report-chart-display-checkbox');
        if (
chartCheckbox)
        {
            
BX.bind(chartCheckbox'click', function () {
                var 
chartSwitchBlock BX('report-chart-switch');
                var 
chartParamsBlock BX('report-chart-params');
                if (
chartSwitchBlock)
                {
                    if (
this.checkedBX.addClass(chartSwitchBloc...

/var/www/allstarsO/allstars.ua/bitrix/modules/conversion/lib/ratemanager.php

Size: 697.00 B Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit nano Line: 31 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$type['CALCULATE']($counters)

/var/www/allstarsO/allstars.ua/bitrix/modules/photogallery/install/components/bitrix/photogallery_user/templates/.default/galleries_recalc.php

Size: 9.64 kB Created: 2023-03-11 16:41:50 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }  
            if (
result['status'] == 'inprogress'
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text']; 
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true
                }
                else
                {
                    
document.getEleme...

/var/www/allstarsO/allstars.ua/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list.ex/templates/.default/template.php

Size: 12.60 kB Created: 2023-03-11 16:41:52 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Exploit infected_comment Line: 111 Warning

Comments composed by 5 random chars usually used to detect if a file is infected yet

/*width*/

/var/www/allstarsO/allstars.ua/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list.ex/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 19.20 kB Created: 2023-03-11 16:41:52 Modified: 2023-11-27 14:53:28 Dangers: 2
DescriptionMatch

Exploit execution Line: 146 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 27 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/photogallery/install/components/bitrix/photogallery/templates/.default/bitrix/blog.post.comment/photogallery/template.php

Size: 30.30 kB Created: 2023-03-11 16:41:45 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/script.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/photogallery/install/components/bitrix/photogallery.detail.list/templates/slider_big/template.php

Size: 16.32 kB Created: 2023-03-11 16:41:53 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Line: 338 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("div.onclick = function(e){jsUtils.PreventDefault(e); jsUtils.Redirect([], '" res[ii].href "');};");
        
res[ii].parentNode.insertBefore(divres[ii]);
        
res[ii].onmouseover = function()
        {
            
this.previousSibling.onshow();
            
this.bxMouseOver 'Y';
        };
        
res[ii].onmouseout = function()
        {
            
this.bxMouseOver 'N';
            var 
__this this;
            
setTimeout(
                function()
                {
                    if (
__this.previousSibling && __this.previousSibling.bxMouseOver != "Y")
                    {
                        
__this.previousSibling...

/var/www/allstarsO/allstars.ua/bitrix/modules/photogallery/lang/en/classes/general/access.php

Size: 81.43 kB Created: 2023-03-15 04:25:15 Modified: 2023-11-27 14:53:28 Warns: 1 Dangers: 1
DescriptionMatch

Exploit silenced_eval Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($Éßé¾ê…($¾ê($ãõà·,'',$éɋ߅æê('W6auMTM62tn2TRXX’T2tu’t’bŽN–’AžhŸCƒŠ62XTK€mG82MOQ‡nZO2sG8VehGC’’+‰ p+nWAA•Ac’GŠsVƒOC7‰At SUN=scndZaxŽCaZƒ8–›nˆRŠtœy n– 8NCXv•nGW‰=’ue‰‘=oƒNœt–UœpORURŠAœe€x=–m K›ŠŽ€2aWš‰ Wk ŠvMŽM’€OU=MpMˆŽe+UŽaAŸNRp–N•‰A8€m––u+8ŸxpmžœNGŽe‰Ž–Ÿƒvuƒsc–žcSaxQWšdOžWvKCRd+S’‰= R7=CeX8žyuŸuemšAŠ–NZ+UyŠCž6XŽ€PvdSs‡€k=Wcc+•a‡8SœKž+N8Š7m8œ‰p‹8Ve‹Žxt–+xhT','m“9L™O+aXv= ž/Œ˜’Žc•3”db€WhFHt–—2EP7‹5ŸšnS…TfA‰lqxƒC‘wg‚84o0jyVZr›YuŠB„DUIJœˆzkKNeM1RGp‡6†iQs'...

Function eval Line: 12 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($Éßé¾ê…($¾ê($ãõà·,'',$éɋ߅æê('W6auMTM62tn2TRXX’T2tu’t’bŽN–’AžhŸCƒŠ62XTK€mG82MOQ‡nZO2sG8VehGC’’+‰ p+nWAA•Ac’GŠsVƒOC7‰At SUN=scndZaxŽCaZƒ8–›nˆRŠtœy n– 8NCXv•nGW‰=’ue‰‘=oƒNœt–UœpORURŠAœe€x=–m K›ŠŽ€2aWš‰ Wk ŠvMŽM’€OU=MpMˆŽe+UŽaAŸNRp–N•‰A8€m––u+8ŸxpmžœNGŽe‰Ž–Ÿƒvuƒsc–žcSaxQWšdOžWvKCRd+S’‰= R7=CeX8žyuŸuemšAŠ–NZ+UyŠCž6XŽ€PvdSs‡€k=Wcc+•a‡8SœKž+N8Š7m8œ‰p‹8Ve‹Žxt–+xhT','m“9L™O+aXv= ž/Œ˜’Žc•3”db€WhFHt–—2EP7‹5ŸšnS…TfA‰lqxƒC‘wg‚84o0jyVZr›YuŠB„DUIJœˆzkKNeM1RGp‡6†iQs',...

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/include/rolesdefinitions.php

Size: 2.22 kB Created: 2023-03-11 16:39:15 Modified: 2023-11-27 14:53:29 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 64 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

Function strrev eval_strrev Line: 68 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/include/actionsdefinitions.php

Size: 14.10 kB Created: 2023-03-11 16:39:15 Modified: 2023-11-27 14:53:29 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 173 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 174 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/shelladapter.php

Size: 1.88 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Warns: 3 Dangers: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($command" > ".$outputPath." 2>&1 &"); return true; } public function getLastOutput() { return $this->resOutput; } public function getLastError() { return $this->resError; } public function syncExec($command) { $command $this->prepareExecution($command); $retVal 1$descriptorspec = array( => array("pipe""r"), => array("pipe""w"), => array("pipe""w") ); $pipes = array(); $process proc_open('/bin/bash'$descriptorspec$pipes); if (is_resource($process)) { fwrite($pipes[0...

Function proc_close Line: 93 Warning

Potentially dangerous function `proc_close`

[https://www.php.net/proc_close]

proc_close($process)

Function proc_open Warning

Potentially dangerous function `proc_open`

[https://www.php.net/proc_open]

proc_open('/bin/bash'$descriptorspec$pipes); if (is_resource($process)) { fwrite($pipes[0], $command); fclose($pipes[0]); $this->resOutput stream_get_contents($pipes[1]); fclose($pipes[1]); $this->resError stream_get_contents($pipes[2]); fclose($pipes[2]); $retVal proc_close($process)

Function strrev exec_strrev Line: 39 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/serversdata.php

Size: 5.18 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 38 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/provider.php

Size: 6.41 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 24 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/actionsdata.php

Size: 6.29 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$param'$fBody); $result $newfunc($buildParam); } return $result; } public static function setLogLevel($logLevel) { self::$logLevel $logLevel; } public static function checkRunningAction() { $result = array(); $shellAdapter = new ShellAdapter(); $execRes $shellAdapter->syncExec("sudo -u root /opt/webdir/bin/bx-process -a list -o json"); $data $shellAdapter->getLastOutput(); if($execRes) { $arData json_decode($datatrue); $result = array(); if(isset($arData["params"])...

Function strrev exec_strrev Line: 85 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/sitesdata.php

Size: 1.57 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 43 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/helper.php

Size: 4.89 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev exec_strrev Line: 186 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/actionmodifyer.php

Size: 2.59 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 2
DescriptionMatch

Function strrev eval_strrev Line: 14 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

Function strrev eval_strrev Line: 21 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/action.php

Size: 6.72 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function(""$paramCode); if(is_callable($func)) { $res $func(); $retStr str_replace('##CODE_PARAMS:'.$paramId.'##'$res$retStr); } } } foreach ($this->freeParams as $key => $paramValue$retStr str_replace('##'.$key.'##'$paramValue$retStr); return $retStr; } public function start(array $inputParams = array()) { if(!is_array($inputParams)) throw new \Bitrix\Main\ArgumentTypeException("inputParams""array"); if(isset($this->actionParams["MODIFYERS"]) && is_array($this->action...

Function strrev exec_strrev Line: 152 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lib/monitoring.php

Size: 14.81 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Warns: 1 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$data'$item["DATA_FUNC"]); if(is_callable($func)) { $result $func($data); } } else { if(isset($data["calcpr"])) { $data["data"] = $data["calcpr"]; } $result = static::extractRrdValue($data); } return $result; } protected static function extractRrdValue($data) { $result false; if(isset($data["data"]) && is_array($data["data"])) { reset($data["data"]); $result current($data["data"]); } return trim($result); } protected static function getAnsibleSetup($hostname) { static $i...

Function strrev exec_strrev Line: 340 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

cExe

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/admin/menu.php

Size: 1.17 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Exploit php_uname Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute arbitrary commands or code on the target machine

php_uname('s')

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lang/en/include/actionsdefinitions.php

Size: 2.74 kB Created: 2023-03-11 16:39:15 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lang/ua/include/actionsdefinitions.php

Size: 3.62 kB Created: 2023-03-11 16:39:14 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/scale/lang/ru/include/actionsdefinitions.php

Size: 3.68 kB Created: 2023-03-11 16:39:15 Modified: 2023-11-27 14:53:29 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 17 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

LAVE

/var/www/allstarsO/allstars.ua/bitrix/modules/fileman/fileman.php

Size: 90.00 kB Created: 2023-03-11 16:38:52 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 241 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . "/bitrix/modules/fileman/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/fileman/options.php

Size: 65.79 kB Created: 2023-03-11 16:38:52 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Exploit execution Line: 1033 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/'.LANGUAGE_ID.'/admin/fileman_js.php')

Exploit execution Line: 1035 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/en/admin/fileman_js.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/fileman/classes/general/editor_utils.php

Size: 8.27 kB Created: 2023-03-11 16:38:54 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($code); echo '#BX_RENDERED_COMPONENT#'$s ob_get_contents(); ob_end_clean(); return $s; } function _RenderAllComponents($arParams$bLPA) { global $APPLICATION$USER$s ''$arPHP PHPParser::ParseFile($arParams['source']); $l count($arPHP); if ($l 0) { $new_source ''$end 0$comp_count 0ob_start(); for ($n 0$n<$l$n++) { $src $arPHP[$n][2]; if (SubStr($src05) == "<?"."php"$src SubStr($src5); else $src SubStr($src2); $src SubStr($src0, -2); $co...

/var/www/allstarsO/allstars.ua/bitrix/modules/fileman/admin/fileman_js.php

Size: 1.58 kB Created: 2023-03-11 16:38:54 Modified: 2023-11-27 14:53:24 Dangers: 2
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/'.LANGUAGE_ID.'/admin/fileman_js.php')

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/fileman/lang/en/admin/fileman_js.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/fileman/admin/fileman_admin.php

Size: 51.04 kB Created: 2023-03-11 16:38:54 Modified: 2023-11-27 14:53:24 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 17 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/admin/fileman_access.php")

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid(fileowner($fnameConverted)); $arrFileGroup posix_getgrgid(filegroup($fnameConverted)); $showField .= " ".$arrFileOwner['name']." ".$arrFileGroup['name']; } } else $showField "&nbsp;"; } $row->AddField("PERMS"$showField); } $showField ""; if (in_array("PERMS_B"$arVisibleColumns)) { $showField "&nbsp;"; if(($USER->CanDoOperation('fileman_view_permissions') || $USER->CanDoOperation('fileman_edit_all_settings')) && $USER->CanDoFileOperation('fm_view_permission'$arPath)) ...

/var/www/allstarsO/allstars.ua/bitrix/modules/clouds/admin/clouds_file_list.php

Size: 26.57 kB Created: 2023-03-11 16:39:35 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 103 Dangerous

Malware Signature (hash: 11413268)

eval($_REQUEST

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/lib/base/controller.php

Size: 12.52 kB Created: 2023-03-11 16:41:58 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { try { $this->collectDebugInfo(); $this->resolveAction(); $this->checkAction(); if ($this->prepareParams() && $this->errorCollection->isEmpty() && $this->processBeforeAction($this->getAction()) === true) { $this->runAction(); } $this->logDebugInfo(); } catch(\Exception $e) { $this->errorCollection->add(array(new Error($e->getMessage()))); } if (!$this->errorCollection->isEmpty()) { $this->sendJsonErrorResponse(); } } protected function collectDebugInfo() { if($this->collectDebugInfo) { D...

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/options.php

Size: 4.53 kB Created: 2023-03-11 16:41:58 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 33 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name[0]}

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/vote_tools.php

Size: 17.63 kB Created: 2023-03-11 16:42:01 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 428 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path.$template)

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/admin/vote_dialog.php

Size: 1.75 kB Created: 2023-03-11 16:42:01 Modified: 2023-11-27 14:53:31 Dangers: 2
DescriptionMatch

Exploit execution Line: 26 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/vote/admin/colorpick.htm")

Exploit execution Line: 27 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/install/public/tools/vote_chart.php

Size: 448.00 B Created: 2023-03-11 16:41:58 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/install/tools/vote_chart.php

Size: 448.00 B Created: 2023-03-11 16:42:01 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/".$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/vote/install/index.php

Size: 8.21 kB Created: 2023-03-11 16:41:58 Modified: 2023-11-27 14:53:31 Dangers: 2
DescriptionMatch

Exploit execution Line: 112 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/vote/install/events/del_events.php")

Exploit execution Line: 137 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/vote/install/events/set_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/asd.subscribequick/install/index.php

Size: 4.60 kB Created: 2023-03-11 16:39:38 Modified: 2023-11-27 14:53:21 Dangers: 2
DescriptionMatch

Exploit execution Line: 101 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/main/include/epilog_admin.php')

Exploit execution Line: 91 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/main/include/prolog_admin_after.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/translate/translate_tools.php

Size: 13.14 kB Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:31 Dangers: 2
DescriptionMatch

Exploit execution Line: 236 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $f['PATH'])

Exploit execution Line: 355 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/translate/options.php

Size: 4.30 kB Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 50 Warning

Double var technique is usually used for the obfuscation of malicious code

${$name}

/var/www/allstarsO/allstars.ua/bitrix/modules/translate/admin/translate_list.php

Size: 21.08 kB Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 89 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$file)

/var/www/allstarsO/allstars.ua/bitrix/modules/translate/admin/translate_edit.php

Size: 17.25 kB Created: 2023-03-11 16:38:42 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 109 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$fname)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/include/prolog_after.php

Size: 4.52 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Dangers: 3
DescriptionMatch

Exploit execution Line: 34 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

Exploit execution Line: 75 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$siteClosed)

Exploit execution Line: 83 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/site_closed.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/include/urlrewrite.php

Size: 5.13 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 169 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/admin/404.php")

Exploit execution Line: 59 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT']."/urlrewrite.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/public/top_panel.php

Size: 54.78 kB Created: 2018-01-19 19:01:34 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 948 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/include/add_top_panel.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/public/menu_edit.php

Size: 21.81 kB Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(\''.$out.'\');'?>

    var arCellsHTML = [
        '<span class="rowcontrol drag" title="<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_DRAG'))?>"></span>',
        getAreaHTML('text_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_TEXT_EDIT'))?>'),
        getAreaHTML('link_' + nums, '', '<?=CUtil::JSEscape(GetMessage('MENU_EDIT_TOOLTIP_LINK_EDIT'))?>'),
        '<span onclick="if (!GLOBAL_bDisableActions) {currentLink = \'' + nums + '\'; OpenFileBrowserWindFile_' + nums + '();}" class="rowcontrol...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/epilog_main_admin.php

Size: 4.07 kB Created: 2018-01-19 18:46:22 Modified: 2023-11-27 14:53:27 Dangers: 2
DescriptionMatch

Exploit execution Line: 44 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$siteSupport)

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/interface/lang_files.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/epilog_auth_admin.php

Size: 1.56 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 7 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/interface/lang_files.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/lang_files.php

Size: 3.48 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 72 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$NEW_LANGS[$i])

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/prolog_auth_admin.php

Size: 2.90 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 61 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/admin_lib.php

Size: 58.72 kB Created: 2018-01-19 19:03:44 Modified: 2023-11-27 14:53:27 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 443 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/admin/.left.menu.php")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcasecmp($a["ID"], $b["ID"]);')); return $aThemes; } public static function GetCurrentTheme() { $aUserOpt CUserOptions::GetOption("global""settings"); if($aUserOpt["theme_id"] <> "") { $theme preg_replace("/[^a-z0-9_.-]/i"""$aUserOpt["theme_id"]); if($theme <> "") { return $theme; } } return ".default"; } } class CAdminUtil { public static function dumpVars($vars$arExclusions = array()) { $result ""; if (is_array($vars)) { foreach ($vars as $varN...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/auth/wrapper.php

Size: 5.87 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:27 Dangers: 2
DescriptionMatch

Exploit execution Line: 128 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$siteSupport)

Exploit execution Line: 68 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/interface/auth/wrapper_auth_result.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/prolog_main_admin.php

Size: 15.84 kB Created: 2018-01-19 18:46:29 Modified: 2023-11-27 14:53:27 Dangers: 3
DescriptionMatch

Exploit execution Line: 245 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/this_site_logo.php")

Exploit execution Line: 257 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

Exploit execution Line: 97 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$adminHeader)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/epilog_jspopup_admin.php

Size: 221.00 B Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 5 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/interface/lang_files.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/interface/admin_list.php

Size: 38.62 kB Created: 2018-01-19 19:02:13 Modified: 2023-11-27 14:53:27 Warns: 2
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["__sort"] == $b["__sort"]) return 0; return ($a["__sort"] < $b["__sort"])? -1 : 1;')); } foreach($this->aHeaders as $id=>$arHeader) { if(in_array($id$this->arVisibleColumns)) $this->aVisibleHeaders[$id] = $arHeader; } if (isset($_REQUEST["mode"]) && $_REQUEST["mode"] == "settings"$this->ShowSettings($aAllCols$aCols$aOptions); } function ShowSettings($aAllCols$aCols$aOptions) { global $USER; require($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/inclu...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(this.form.action[this.form.action.selectedIndex].getAttribute('custom_action'));return false;}" disabled="disabled" class="adm-table-action-button" />
<? endif; ?>
    <span class="
adm-table-counter" id="<?=$this->table_id?>_selected_count"><?=GetMessage('admin_lib_checked')?>: <span>0</span></span>
<? endif; ?>
</div>
<? } public function DisplayList($arParams = array()) { $menu = new CAdminPopup($this->table_id."_menu"$this->table_id."_menu"); $menu->Show(); if( (isset($_REQUEST['ajax_debu...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/config/configuration.php

Size: 9.95 kB Created: 2018-01-19 18:57:16 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 250 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/cluster/memcache.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/config/option.php

Size: 11.03 kB Created: 2018-01-19 19:01:45 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 133 Warning

Double var technique is usually used for the obfuscation of malicious code

${$varName}

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/composite/responder.php

Size: 18.28 kB Created: 2018-01-19 19:02:20 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 650 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/cluster/memcache.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/eventmanager.php

Size: 12.57 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if ($a["SORT"] == $b["SORT"]) return 0; return ($a["SORT"] < $b["SORT"]) ? -1 : 1;'); foreach (array_keys($handlers) as $moduleId) { foreach (array_keys($handlers[$moduleId]) as $event) { uasort($this->handlers[$moduleId][$event], $funcSort); } } } $this->isHandlersLoaded true; } protected function clearLoadedHandlers() { $managedCache Application::getInstance()->getManagedCache(); $managedCache->clean(self::$cacheKey); foreach($this->handlers as $module=>$types) {...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/page/asset.php

Size: 58.20 kB Created: 2018-01-19 19:02:20 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$matches''return $matches[1].Bitrix\Main\Page\Asset::replaceUrlCSS($matches[3], $matches[2], "'.addslashes($path).'").")";'), $content ); $content preg_replace_callback'#(\s*@import\s*)([\'"])([^\'"]+)(\2)#si'create_function('$matches''return $matches[1].Bitrix\Main\Page\Asset::replaceUrlCSS($matches[3], $matches[2],"'.addslashes($path).'");'), $content ); return $content; } public function groupJs($from ''$to '') { if(empty($from) || empty($to)) { return; } $to ...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/userconsent/consent.php

Size: 3.39 kB Created: 2018-01-19 19:01:39 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit nano Line: 99 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$provider['DATA']($originId)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/userconsent/internals/componentcontroller.php

Size: 1.99 kB Created: 2018-01-19 19:01:39 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->request Context::getCurrent()->getRequest(); $this->action $this->request->get('action'); $this->prepareRequestData(); if($this->check()) { call_user_func_array($this->getActionCall(), array($this->requestData)); } $this->giveResponse()

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/servicemanager.php

Size: 1.95 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit nano Line: 55 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

$obj[1]()

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/mail/eventmessagethemecompiler.php

Size: 10.14 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('use \Bitrix\Main\Mail\EventMessageThemeCompiler; ob_start();?>' $template '<? return ob_get_clean();'); } catch(StopException $e) { ob_clean(); throw $e; } return $result; } protected function addReplaceCallback($identificator$callback) { $this->replaceCallback[$identificator] = $callback; } protected function executeReplaceCallback() { $arReplaceIdentificators = array(); $arReplaceStrings = array(); foreach($this->replaceCallback as $identificator => $callback) { $result call_user...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/modulemanager.php

Size: 2.94 kB Created: 2018-01-19 18:59:42 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 54 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$modulePath)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/ui/uploader/uploader.php

Size: 12.99 kB Created: 2018-01-19 19:03:39 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('&$v,$k''if($k=="error"){$v=preg_replace("/<(.+?)>/is".BX_UTF_PCRE_MODIFIER, "", $v);}')); return self::removeTmpPath($data); } protected function fillRequireData() { $this->mode $this->getRequest("mode"); if (!in_array($this->mode, array("upload""delete""view"))) throw new ArgumentOutOfRangeException("mode"); if ($this->mode != "view" && !check_bitrix_sessid()) throw new AccessDeniedException("Bad sessid."); $this->version $this->getRequest("version"); $directory = \CB...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/ui/fileinputreceiver.php

Size: 6.95 kB Created: 2018-01-19 18:57:16 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->getAgent()->checkPost()

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/ui/fileinputunclouder.php

Size: 3.06 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec($mode "basic"$params = array()) { $res $this->check($params); if ($this->check($params)) { $this->file = \CFile::getByID($this->id)->fetch(); if ($mode == "resize" && ($file = \CFile::ResizeImageGet($this->id$paramsBX_RESIZE_IMAGE_PROPORTIONALtrue)) && $file) { $this->file["SRC"] = $file["src"]; $this->file["WIDTH"] = $file["width"]; $this->file["HEIGHT"] = $file["height"]; $this->file["FILE_SIZE"] = $file["size"]; } \CFile::ViewByUser($this->file, array("force_download" => fals...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/data/connectionpool.php

Size: 8.44 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 26 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/db/connection.php

Size: 21.29 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Function strrev eval_strrev Line: 317 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/entity/query.php

Size: 75.99 kB Created: 2018-01-19 19:03:39 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec() { $this->is_executing true$query $this->buildQuery(); $cacheId ""$ttl 0$result null; if($this->cacheTtl && (empty($this->join_map) || $this->cacheJoins == true)) { $ttl $this->entity->getCacheTtl($this->cacheTtl); } if($ttl 0) { $cacheId md5($query); $result $this->entity->readFromCache($ttl$cacheId$this->countTotal); } if($result === null) { $result $this->query($query); if($ttl 0) { $result $this->entity->writeToCache($result$cacheId$this->count...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lib/entity/base.php

Size: 20.70 kB Created: 2018-01-19 19:02:13 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($eval); $entity self::getInstance($entity_name); foreach ($fieldsMap as $k => $v) { $entity->addField($v$k); } return $entity; } public static function compileEntity($entityName$fields null$parameters = array()) { $classCode ''$classCodeEnd ''; if (strtolower(substr($entityName, -5)) !== 'table') { $entityName .= 'Table'; } if (!preg_match('/^[a-z0-9_]+$/i'$entityName)) { throw new Main\ArgumentException(sprintf'Invalid entity classname `%s`.'$entityName )); } $fullEnt...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/mysql/database.php

Size: 23.42 kB Created: 2018-01-19 19:02:20 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 3
DescriptionMatch

Exploit double_var2 Line: 678 Warning

Double var technique is usually used for the obfuscation of malicious code

${$varnameFrom}

Exploit execution Line: 192 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/dbquery_error.php")

Exploit execution Line: 194 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/dbquery_error.php")

Function strrev eval_strrev Line: 126 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/mysql/agent.php

Size: 5.18 kB Created: 2018-01-19 19:03:39 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$eval_result=".$arAgent["NAME"]); } catch (Exception $e) { CTimeZone::Enable(); $application = \Bitrix\Main\Application::getInstance(); $exceptionHandler $application->getExceptionHandler(); $exceptionHandler->writeToLog($e); continue; } CTimeZone::Enable(); if ($logFunction$logFunction($arAgent"finish"$eval_result$e); if($e === false) { continue; } elseif(strlen($eval_result)<=0) { $strSql "DELETE FROM b_agent WHERE ID=".$arAgent["ID"]; } else { $strSql "
                    UPDATE b_agen...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/database.php

Size: 33.13 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 4
DescriptionMatch

Exploit double_var2 Line: 1052 Warning

Double var technique is usually used for the obfuscation of malicious code

${$SHOWALL_NAME}

Exploit execution Line: 133 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/dbconn_error.php")

Exploit execution Line: 135 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/dbconn_error.php")

Exploit execution Line: 229 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/after_connect.php")

Function strrev eval_strrev Line: 35 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

lave

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/component.php

Size: 39.86 kB Created: 2018-01-19 19:02:20 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 1398 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$epilogFile)

Exploit execution Line: 551 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__path."/component.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/grids.php

Size: 16.11 kB Created: 2018-01-19 18:57:16 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["name"], $b["name"]);')); return $arThemes; } public static function GetTheme($grid_id) { $aOptions CUserOptions::GetOption("main.interface.grid"$grid_id, array()); if($aOptions["theme"] == '') { $aGlobalOptions CUserOptions::GetOption("main.interface""global", array(), 0); if($aGlobalOptions["theme_template"][SITE_TEMPLATE_ID] <> ''$theme $aGlobalOptions["theme_template"][SITE_TEMPLATE_ID]; else $theme ""; } else { $theme $aOptions["th...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/zip.php

Size: 66.90 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('$res = '.$arParams['callback_pre_add'].'(\'callback_pre_add\', $arLocalHeader);'); if ($res == 0) { $arHeader['status'] = "skipped"$res 1; } if ($arHeader['stored_filename'] != $arLocalHeader['stored_filename']) { $arHeader['stored_filename'] = $this->_reducePath($arLocalHeader['stored_filename']); } } if ($arHeader['stored_filename'] == "") { $arHeader['status'] = "filtered"; } if (strlen($arHeader['stored_filename']) > 0xFF) { $arHeader['status'] = 'filename_too_long'; } if ($arHeade...

Sign 963e968a Line: 2571 Dangerous

Malware Signature (hash: 963e968a)

php_uname()

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_class.php

Size: 140.73 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 3
DescriptionMatch

Exploit execution Line: 3798 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

Exploit silenced_eval Line: 3274 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("\$path=".$str_fill_path_value_2.$path."((\$by=\"\"),(\$order=\"\"),array(\"ACTIVE\"=>\"Y\"));\$cnt=0;while(\$ar_"."res=\$path->Fe"."tch())\$cnt++;"); return $cnt;} } public static function GetModuleVersion($module) { if (strlen($module)<=0) return false$strModule_tmp_dir $_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module; if (file_exists($strModule_tmp_dir) && is_dir($strModule_tmp_dir)) { if ($module != "main") { if (file_exists($strModule_tmp_dir."/install/index.php")) { $arModule_...

Sign 696317c4 Line: 3274 Dangerous

Malware Signature (hash: 696317c4)

@eval("\

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_client_partner.php

Size: 75.03 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 564 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/component_template.php

Size: 30.34 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Dangers: 3
DescriptionMatch

Exploit execution Line: 714 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__fileAlt)

Exploit execution Line: 720 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__file)

Exploit execution Line: 877 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$this->__folder."/result_modifier.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/menu.php

Size: 15.46 kB Created: 2018-01-19 18:46:29 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) $bSkipMenuItem true; } if(!$bSkipMenuItem$ITEM_INDEX++; if(($pos strpos($LINK"?"))!==false$ITEM_TYPE "U"; elseif(substr($LINK, -1)=="/"$ITEM_TYPE "D"; else $ITEM_TYPE "P"$SELECTED false; if($bCached) { $all_links $arMenuCache[$iMenuItem]["LINKS"]; if(!is_array($all_links)) $all_links = array(); } else { $all_links = array(); if(is_array($ADDITIONAL_LINKS)) { foreach($ADDITIONAL_LINKS as $link) { $tested_link trim(Rel2Abs($this->MenuDir, ...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/user.php

Size: 139.50 kB Created: 2018-01-19 19:03:44 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 4780 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_b24.php

Size: 9.88 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function syslog Warning

Potentially dangerous function `syslog`

[https://www.php.net/syslog]

syslog(LOG_INFO$_SERVER["HTTP_HOST"]."\tstart\t".$moduleId.$arUpdaters[$i1][0]); CUpdateClient::RunUpdaterScript($this->updatersDir.$moduleId.$arUpdaters[$i1][0], $errorMessageTmp""$moduleId); syslog(LOG_INFO$_SERVER["HTTP_HOST"]."\tend\t".$moduleId.$arUpdaters[$i1][0]."\t".$errorMessageTmp); if (strlen($errorMessageTmp) > 0$errorMessage .= str_replace("#MODULE#"$moduleIdstr_replace("#VER#"$arUpdaters[$i1][1], GetMessage("SUPP_UK_UPDN_ERR"))).": ".$errorMessageTmp."."$this->Col...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/wizard_site.php

Size: 40.55 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);')); if (array_key_exists("GROUPS"$arWizardTemplates) && is_array($arWizardTemplates["GROUPS"])) $this->arTemplateGroups $arWizardTemplates["GROUPS"]; } function __GetInstallationScript() { $instScript $_SERVER["DOCUMENT_ROOT"].$this->path."/wizard.php"; if (!is_file($instScript)) return false$this->pathToScript $instScript; return true; } function __GetServices() { $serviceFile $_SERVER["DOCUMENT_ROOT"].$this->path."/....

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/component_util.php

Size: 63.40 kB Created: 2022-12-12 15:45:41 Modified: 2023-11-27 14:53:26 Dangers: 6
DescriptionMatch

Exploit execution Line: 153 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $componentFolder "/" $file "/.description.php")

Exploit execution Line: 212 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $componentFolder "/" $file "/" $file1 "/.description.php")

Exploit execution Line: 366 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $componentPath "/.description.php")

Exploit execution Line: 413 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $componentPath "/.parameters.php")

Exploit execution Line: 882 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $templateFolder "/.parameters.php")

Exploit execution Line: 969 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $templateFolderPath "/" $file1 "/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/vuln_scanner.php

Size: 63.50 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Sign f9dc0a55 Line: 1938 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_list.php

Size: 1.21 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("parent."+this.name+"_"+str);
    }
    catch(
e){}
}
</
script>

</
head>
<
body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0" bgcolor="white">

<
table width="100%" border="0" id="updates_items">
</
table>

</
body>
</
html>
<? require(
$_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/epilog_after.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/controller_member.php

Size: 41.85 kB Created: 2018-01-19 19:02:17 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 1076 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['parameters'])

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($disconnect_command); COption::SetOptionString("main""controller_member""N"); } public static function GetBackup($bRefresh false) { static $arCachedData; if(!isset($arCachedData) || $bRefresh$arCachedData unserialize(COption::GetOptionString("main""~controller_backup""")); return $arCachedData; } public static function SetBackup($arBackup) { COption::SetOptionString("main""~controller_backup"serialize($arBackup)); CControllerClient::GetBackup(true); } public static functio...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_client.php

Size: 250.21 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 2 Dangers: 14
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

'X1VwZGF0ZVN5c3RlbScpLCAwLCAxMDI0KTsKICAgICAgICAgICAgICAgICAgICBteV9yZXN1bHQ6PWRibXNfbG9jay5yZXF1ZXN0KG15X2xvY2tfaWQsIGRibXNfbG9jay54X21vZGUsIDAsIHRydWUpOwogICAgICAgICAgICAgICAgICAgIC0tICBSZXR1cm4gdmFsdWU6CiAgICAgICAgICAgICAgICAgICAgLS0gICAgMCAtIHN1Y2Nlc3MKICAgICAgICAgICAgICAgICAgICAtLSAgICAxIC0gdGltZW91dAogICAgICAgICAgICAgICAgICAgIC0tICAgIDIgLSBkZWFkbG9jawogICAgICAgICAgICAgICAgICAgIC0tICAgIDMgLSBwYXJhbWV0ZXIgZXJyb3IKICAgICAgICAgICAgICAgICAgICAtLSAgICA0IC0gYWxyZWFkeSBvd24gbG9jayBzcGVjaWZpZWQgYnk...

Exploit execution Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER[___708070088(2217)

Exploit silenced_eval Line: 1 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval($GLOBALS['____2118741149'][1005](array('<?php''<?''?>')

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($_1468909282["#"]["cdata-section"][(1104/2-552)]["#"]);} catch(Exception $_691450541){ $_336334048___708070088(38).$_691450541->getCode().___708070088(39).$_691450541->getMessage();} $_1079794711 .= ___708070088(40).$GLOBALS['____2118741149'][24]($_1468909282[___708070088(41)][___708070088(42)]).___708070088(43).$GLOBALS['____2118741149'][25]($_336334048);}} if(empty($_1629220684)){ CUpdateClient::AddMessage2Log($GLOBALS['____2118741149'][26](___708070088(44), ___708070088(45), $_10797947...

Sign 7830f7a6 Line: 1 Dangerous

Malware Signature (hash: 7830f7a6)

N5c3Rlb

Sign 7f5d33bf Line: 1 Dangerous

Malware Signature (hash: 7f5d33bf)

JlcGxhY2

Sign 91535293 Line: 1 Dangerous

Malware Signature (hash: 91535293)

luY2x1ZG

Sign 963e968a Line: 1 Dangerous

Malware Signature (hash: 963e968a)

pbmNsdWRl

Sign 99fc3b9d Line: 1 Dangerous

Malware Signature (hash: 99fc3b9d)

$GLOBALS['____

Sign a408f408 Line: 1 Dangerous

Malware Signature (hash: a408f408)

c3RyX

Sign ae7830db Line: 1 Dangerous

Malware Signature (hash: ae7830db)

Y29we

Sign d30fc49e Line: 1 Dangerous

Malware Signature (hash: d30fc49e)

b3Blb

Sign d97f004d Line: 1 Dangerous

Malware Signature (hash: d97f004d)

ZXhlYy

Sign de12c454 Line: 1 Dangerous

Malware Signature (hash: de12c454)

vcGVu

Sign ee1cb326 Line: 1 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

Sign f9dc0a55 Dangerous

Malware Signature (hash: f9dc0a55)

'base64_decode'

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_log.php

Size: 4.71 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a['.$sort.'], $b['.$sort.'])*('.$ord.');')); } $rsData = new CAdminResult(null$sTableID); $rsData->InitFromArray($arLogRecs); $rsData->NavStart(); $lAdmin->NavText($rsData->GetNavPrint(GetMessage("update_log_nav"))); $n 0; while($rec $rsData->Fetch()) { $row = &$lAdmin->AddRow(0null); $aDate explode(" "htmlspecialcharsbx($rec[1])); $row->AddField("DATE"'<span style="white-space:nowrap">'.$aDate[0].'</span> '.$aDate[1]); $row->AddField("DESC...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/main.php

Size: 179.28 kB Created: 2022-09-19 12:42:18 Modified: 2023-11-27 14:53:26 Warns: 4 Dangers: 8
DescriptionMatch

Exploit double_var2 Line: 220 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

Exploit execution Line: 1326 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . $path)

Exploit execution Line: 204 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . BX_ROOT "/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 206 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . BX_ROOT "/modules/main/include/epilog_admin.php")

Exploit execution Line: 274 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . BX_ROOT "/modules/main/include/prolog" $isAdmin "_after.php")

Exploit execution Line: 288 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . BX_ROOT "/modules/main/interface/auth/wrapper.php")

Exploit execution Line: 297 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . BX_ROOT "/modules/main/include/epilog" $isAdmin ".php")

Exploit silenced_eval Line: 4175 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("return " $strCondition ";")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a[1] == $b[1]) return 0; return ($a[1] < $b[1])? -1 : 1;')); $res = array(); foreach ($this->__view[$view] as $item$res[] = $item[0]; return implode($res); } public static function OnChangeFileComponent($path$site) { global $APPLICATION; if (!HasScriptExtension($path)) return; $docRoot CSite::GetSiteDocRoot($site); CUrlRewriter::Delete( array("SITE_ID" => $site"PATH" => $path"ID" => "NULL") ); if (class_exists("\\Bitrix\\Main\\Application"false)) { \Bit...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("?>" $fTmp->GetContents()); } $FILE_PERM $PERM[$path_file]; if (!is_array($FILE_PERM)) $FILE_PERM = array(); if (!$bOverWrite && count($FILE_PERM) > 0) return true$bDiff false$str "<?\n"; foreach ($arPermissions as $group => $perm) { if (strlen($perm) > 0$str .= "\$PERM[\"" EscapePHPString($path_file) . "\"][\"" EscapePHPString($group) . "\"]=\"" EscapePHPString($perm) . "\";\n"; if (!$bDiff) { $curr_perm $FILE_PERM[$group]; if (!isset($curr_perm) && preg_match('/^G[0-...

Function posix_kill Warning

Potentially dangerous function `posix_kill`

[https://www.php.net/posix_kill]

posix_kill(getmypid(), 9);')); define("BX_FORK_AGENTS_AND_EVENTS_FUNCTION_STARTED", true); global $DB, $CACHE_MANAGER; $CACHE_MANAGER = new CCacheManager; $DBHost = $DB->DBHost; $DBName = $DB->DBName; $DBLogin = $DB->DBLogin; $DBPassword = $DB->DBPassword; $DB = new CDatabase; $DB->Connect($DBHost, $DBName, $DBLogin, $DBPassword); $app = \Bitrix\Main\Application::getInstance(); if ($app != null) { $con = $app->getConnection(); if ($con != null) $con->connect(); } $DB->DoConnect(); $DB->StartUsin...

Sign 11413268 Line: 1509 Dangerous

Malware Signature (hash: 11413268)

eval("?>

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/checklist.php

Size: 41.67 kB Created: 2018-01-19 19:01:39 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 298 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$arPoint["FILE_PATH"])

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/update_update.php

Size: 89.67 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("DescrDetList_"+sModule));
            
wnd.document.write('</font>');
            
wnd.document.write('\n</body></html>');
        }
        
//-->
        
</script>

        <
table border="0" cellspacing="1" cellpadding="2" width="99%">
        <
tr>
            <
td align="center" class="tablehead1"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DATE"?></font></td>
            <td align="center" class="tablehead2"><font class="tableheadtext"><?= GetMessage("SUP_HIST_DESCR"?></font></td>
            <td align="center" class="tablehead3"><font class="tablehe...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/sql_util.php

Size: 22.78 kB Created: 2018-01-19 18:57:16 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function("&\$item""\$item=IntVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tmp[] = "(1 = 2)"; else $arSqlSearch_tmp[] = (($strNegative == "Y") ? " NOT " "")."(".$arFields[$key]["FIELD"]." IN (".$val."))"; } elseif ($arFields[$key]["TYPE"] == "double") { array_walk($valscreate_function("&\$item""\$item=DoubleVal(\$item);")); $vals array_unique($vals); $val implode(","$vals); if (count($vals) <= 0$arSqlSearch_tm...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/classes/general/site_checker.php

Size: 87.96 kB Created: 2018-01-19 19:03:44 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 4
DescriptionMatch

Exploit execution Line: 2845 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/license_key.php')

Exploit execution Line: 2931 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/dbconn_error.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec('catdoc -V'$output$return_var); if ($return_var === 0) { $version $output[0]; if (strpos($version'0.94.4') !== false || strpos($version'0.94.3') !== false$strError .= GetMessage('MAIN_CATDOC_WARN', array('#VERSION#' => $version)); } } return $this->Result(false$strError); } function check_fast_download() { $tmp $_SERVER['DOCUMENT_ROOT'].'/bitrix/tmp/success.txt'; if (!CheckDirPath($tmp) || !file_put_contents($tmp'SUCCESS')) return $this->Result(falseGetMessage("MAIN_TMP_...

Sign 471b95ee Line: 513 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

Sign 471b95ee Line: 515 Dangerous

Malware Signature (hash: 471b95ee)

SUHOSIN

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin_tools.php

Size: 23.88 kB Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 3
DescriptionMatch

Exploit execution Line: 180 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].$root.$init."/.description.php")

Exploit execution Line: 232 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path_mod."/".$file_templ."/.description.php")

Exploit execution Line: 266 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path."/".$folder_name."/.description.php")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$v1,$v2','if ($v1>$v2) return 1; elseif ($v1<$v2) return -1;')); return $arrTemplate; } } class CTemplates { public static function GetList($arFilter = array(), $arCurrentValues = array(), $template_id = array()) { if(!is_set($arFilter"FOLDER")) { $arr CTemplates::GetFolderList(); $arFilter["FOLDER"] = array_keys($arr); } $arTemplates = array(); foreach($arFilter["FOLDER"] as $folder) { $folder _normalizePath($folder); $arTemplates[$folder] = array(); $arPath = array( "/bi...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/tools.php

Size: 166.35 kB Created: 2018-01-19 19:03:45 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 2
DescriptionMatch

Exploit download_remote_code2 Line: 3344 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($fp"Host: ".$_SERVER["HTTP_HOST"]."\nDate: ".date("Y-m-d H:i:s")

Exploit execution Line: 3744 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/countries.php")

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(ua) != null)
                        {
                            
rv parseFloat(RegExp.$1);
                        }
                    }
                    else if (
n.appName == "Netscape")
                    {
                        
rv 11;
                        
re = new RegExp("Trident/.*rv:([0-9]+[\.0-9]*)");
                        if (
re.exec(ua) != null)
                        {
                            
rv parseFloat(RegExp.$1);
                        }
                    }
                }

                return 
rv;
            }

        })(
windowdocumentnavigator);
JS;
return 
'<script type="text/javascript" data-skip-moving="true">'.str_replace(array("\n""\t"), ""$js)."</script>"; } public static function GetScrip...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/module_admin.php

Size: 8.01 kB Created: 2018-01-19 19:03:45 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["MODULE_SORT"] == $b["MODULE_SORT"]) return strcasecmp($a["MODULE_NAME"], $b["MODULE_NAME"]); return ($a["MODULE_SORT"] < $b["MODULE_SORT"])? -1 : 1;')); $fb = ($id == 'fileman' && !$USER->CanDoOperation('fileman_install_control')); if($isAdmin && !$fb && check_bitrix_sessid()) { if(strlen($_REQUEST["uninstall"])>|| strlen($_REQUEST["install"])>0) { $id str_replace("\\"""str_replace("/"""$id)); if($Module CModule::CreateModuleObject($id)) { if($Modu...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/group_edit.php

Size: 28.92 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("document.form1.USER_ID_FROM_" id);
                var 
ed1 = eval("document.form1.USER_ID_TO_" id);
                
ed.disabled = !obj.checked;
                
ed1.disabled = !obj.checked;
            }
            </
script>
            <? 
$ind = -1$dbUsers CUser::GetList(($b="id"), ($o="asc"), array("ACTIVE" => "Y")); while ($arUsers $dbUsers->Fetch()) { $ind++; ?>
                <tr>
                    <td>
                        <input type="hidden" name="USER_ID_<?=$ind?>" value="<?=$arUsers["ID"?>">
                        <input type="checkbox" name="USER_ID_ACT_<?=$ind?>" id="USER_ID_ACT_ID_...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/userfield_edit.php

Size: 17.60 kB Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(i);
            if (
&& r[1] > 0)
            {
                
addNewRow('list_table');
            }
        }

    });

});
//-->
</script>
<
form method="POST" Action="<?echo $APPLICATION->GetCurPage()."?lang=".urlencode(LANG)?>" ENCTYPE="multipart/form-data" name="post_form">
<? 
$tabControl->Begin(); ?>
<? $tabControl
->BeginNextTab(); ?>
    <?if($ID):?>
    <tr>
        <td width="40%">ID:</td>
        <td width="60%"><?=$ID?></td>
    </tr>
    <?endif?>
    <tr class="adm-detail-required-field">
        <td width="40%"><?=GetMessage("USERTYPE_USER_TYPE_ID")?>:</...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/restore.php

Size: 162.40 kB Created: 2018-03-15 13:24:50 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 701 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/license_key.php')

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($l); } if ($DBName && !preg_match('#^\*+$#'$DBName)) { $strWarning .= '<li>'.getMsg('DBCONN_WARN'); $create_db false; } else { $DBHost 'localhost'.(file_exists($_SERVER['DOCUMENT_ROOT'].'/../BitrixEnv.exe') ? ':31006' ''); $DBLogin 'root'$DBPassword ''$DBName 'bitrix_'.(rand(11,99)); $create_db "Y"; } } else { $DBHost $_REQUEST["DBHost"]; $DBLogin $_REQUEST["DBLogin"]; $DBPassword $_REQUEST["DBPassword"]; $DBName $_REQUEST["DBName"]; $create_db $_REQUEST["creat...

Sign 7830f7a6 Line: 1755 Dangerous

Malware Signature (hash: 7830f7a6)

NvcH

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/dump_list.php

Size: 15.63 kB Created: 2018-01-19 19:01:39 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(result);
            
PartDownload();
        }
        
CHttpRequest.Send(url);
    }

    function 
PartDownload()
    {
        if (!
links || links.length == 0)
            return;

        var 
link links.pop();
        var 
iframe document.createElement('iframe');
        
iframe.style.display "none";
        
iframe.src link;
        
document.body.appendChild(iframe);

        
window.setTimeout(PartDownload10000);
    }

    function 
EndDump()
    {
    }
</
script>
<
div id="dump_result_div"></div>
<? 
$lAdmin->DisplayList(); echo BeginNote(); echo GetMessage("MAIN_DUMP_HEAD...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/settings.php

Size: 11.09 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["SORT"] == $b["SORT"]) return strcasecmp($a["NAME"], $b["NAME"]); return ($a["SORT"] < $b["SORT"])? -1 : 1;')); $mid $_REQUEST["mid"]; if($mid == "" || !isset($arModules[$mid]) || !file_exists($arModules[$mid]["PAGE"])) $mid "main"ob_start(); include($arModules[$mid]["PAGE"]); $strModuleSettingsTabs ob_get_contents(); ob_end_clean(); $APPLICATION->SetTitle(GetMessage("MAIN_TITLE")); require_once ($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/pr...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/message_admin.php

Size: 13.39 kB Created: 2018-01-19 18:46:29 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 66 Warning

Double var technique is usually used for the obfuscation of malicious code

${$f}

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/menu.php

Size: 24.77 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["sort"] == $b["sort"]) return strcasecmp($a["text"], $b["text"]); return ($a["sort"] < $b["sort"])? -1 : 1;')); } } $settingsItems[] = array( "text" => GetMessage("MAIN_MENU_MODULE_SETTINGS"), "url" => "settings.php?lang=".LANGUAGE_ID"title" => GetMessage("MAIN_MENU_SETTINGS_ALT"), "dynamic"=>true"module_id"=>"main""items_id"=>"menu_module_settings""items"=>$aModuleItems, ); } if($USER->CanDoOperation('view_other_settings') || $USER->CanDoOperation('cache...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/checklist_report.php

Size: 18.84 kB Created: 2018-01-19 18:59:48 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 25 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/".LANG."/admin/checklist.php")

Function eval Line: 305 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=$arStates;?>);
        var Dialog = false;
        var current = 0;
        var next = 0;
        var prev = 0;
        var last_id = false;
        function InitState()
        {
            var el = false;
            for (var i=0;i<arStates["SECTIONS"].length;i++)
            {
                el = arStates["SECTIONS"][i];
                if (el.CHECKED == "Y")
                    BX.addClass(BX(el.ID+"_name"),"checklist-testlist-green");
                BX(el.ID+"_stat").innerHTML = "(<span class=\"checklist-testlist-passed-test\">"+el.CHECK+"</span>/"+el.TOTAL+")";
            }
            for (i=0;i<arStates["POINTS...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/main_controller.php

Size: 8.74 kB Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($oRequest->arParameters['join_command']); $oResponse->status "200 OK"; } else { $oResponse->status "472 Bad Request"$oResponse->text GetMessage("MAIN_ADM_CONTROLLER_ERR8"); } } elseif(!$oRequest->Check()) { $oResponse->status "403 Access Denied"$oResponse->text "Access Denied"; } else { switch($oRequest->operation) { case "ping"$oResponse->status "200 OK"; break; case "register"$ticket_id COption::GetOptionString("main""controller_ticket"""); list($ticket_created, ...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/php_command_line.php

Size: 10.83 kB Created: 2018-01-19 19:01:35 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($query); ob_end_flush(); printf("<hr>".GetMessage("php_cmd_exec_time")." %0.6f"microtime(1) - $stime); } require($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin_js.php"); die(); } $APPLICATION->SetTitle(GetMessage("php_cmd_title")); CJSCore::Init(array('ls')); if( $_SERVER['REQUEST_METHOD'] == 'POST' && $_POST["ajax"] === "y" && (isset($_POST["add"]) || $remove) ) { CUtil::JSPostUnescape(); require_once($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/include/prolog_a...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/update_system_market.php

Size: 29.34 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 88 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/admin/update_system_market_notru.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/checklist.php

Size: 44.38 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=$arStates;?>);
        var DetailWindow = false;
        var arMainStat ={
            "REQUIRE":<?=$arStat["REQUIRE"];?>,
            "REQUIRE_CHECK":<?=$arStat["REQUIRE_CHECK"];?>,
            "FAILED":<?=$arStat["FAILED"];?>,
            "SUCCESS":<?=$arStat["CHECK"];?>,
            "SUCCESS_R":<?=$arStat["CHECK_R"];?>,
            "TOTAL":<?=$arStat["TOTAL"];?>
        };
        var arRequireCount=<?=$arStat["REQUIRE"];?>;
        var arRequireCheckCount=<?=$arStat["REQUIRE_CHECK"];?>;
        var arFailedCount = <?=$arStat["FAILED"];?>;
        var CanClose = "<?=$arCanClose;...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/index.php

Size: 649.00 B Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/prolog_admin_after.php")

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/epilog_admin.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/partner_modules.php

Size: 18.52 kB Created: 2018-01-19 18:57:16 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''if($a["MODULE_SORT"] == $b["MODULE_SORT"]) return strcasecmp($a["MODULE_NAME"], $b["MODULE_NAME"]); return ($a["MODULE_SORT"] < $b["MODULE_SORT"])? -1 : 1;')); $stableVersionsOnly COption::GetOptionString("main""stable_versions_only""Y"); $arRequestedModules CUpdateClientPartner::GetRequestedModules(""); $arUpdateList CUpdateClientPartner::GetUpdatesList($errorMessageLANG$stableVersionsOnly$arRequestedModules, Array("fullmoduleinfo" => "Y")); $strError_...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/site_checker.php

Size: 35.03 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 242 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['global_test_vars'])

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(result);

                var 
oTable BX('fix_table');
                if (
oRow BX('in_progress'))
                {
                    
oCell oRow.cells[1];
                }
                else
                {
                    
oRow oTable.insertRow(-1);
                    
oCell oRow.insertCell(-1);
                    
oCell.style.width '40%';
                    
oCell.innerHTML strCurrentTestName;
                    
oCell oRow.insertCell(-1);
                }

                if (
strResult == '')
                {
                    
oRow.setAttribute('id''in_progress');
                    
oCell.innerHTML '<div class="sc_progress" style="width:' test_percent '%">' test_percent ...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/dump.php

Size: 46.38 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(result))
            
counter_sec regs[1];
    }
}

function 
IncCounter()
{
    
window.setTimeout(IncCounter1000);
    if (!
counter_started)
        return;

    
counter_sec ++;
    var 
ob;
    if (
ob BX('counter_field'))
    {
        var 
min Math.floor(counter_sec 60);
        var 
sec counter_sec 60;
        if (
min 10)
            
min '0' min;
        if (
sec 10)
            
sec '0' sec;
        
ob.innerHTML min ':' sec;
    }
}
window.setTimeout(IncCounter1000);

function 
GetLicenseInfo()
{
    
CHttpRequest.Action = function(result)
    {
        
BX('...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/user_admin.php

Size: 25.55 kB Created: 2018-01-19 19:03:45 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 77 Warning

Double var technique is usually used for the obfuscation of malicious code

${$f}

/var/www/allstarsO/allstars.ua/bitrix/modules/main/admin/checklist_detail.php

Size: 15.88 kB Created: 2018-01-19 18:59:48 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 25 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/main/lang/".LANG."/admin/checklist.php")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("(" +data+")");
                var 
show_result false;
                var 
buttons BX.findChildren(BX('checklist-popup-tes-status'), {className:'checklist-popup-tes-status'});
                if (
json_data.STATUS || stoptest == true)
                {
                    if (
json_data.STATUS)
                    {
                        
BX("show_detail_link").style.display "none";
                        
BX("detail_system_comment_<?=$jsTestID;?>").innerHTML "";
                        
currentStatus json_data.STATUS;
                        
RefreshCheckList(json_data);
                        for(var 
i=0i<buttons.lengthi++)
                        
BX.removeCl...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/spread.php

Size: 1.43 kB Created: 2023-04-12 19:52:18 Modified: 2023-11-27 14:53:26 Dangers: 2
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_GET["s"])

/var/www/allstarsO/allstars.ua/bitrix/modules/main/tools/upload.php

Size: 984.00 B Created: 2018-01-19 18:57:16 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

exec($_REQUEST["mode"], array("width" => $_REQUEST["width"], "height" => $_REQUEST["height"])

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/probki/.description.php

Size: 142.00 B Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.description.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/probki/.parameters.php

Size: 102.00 B Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/.parameters.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/probki/index.php

Size: 98.00 B Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/probki/lang/ru/exec/index.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/admin_info/index.php

Size: 2.18 kB Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 6 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/weather/.description.php

Size: 143.00 B Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.description.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/weather/.parameters.php

Size: 103.00 B Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/.parameters.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/weather/index.php

Size: 99.00 B Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/gadgets/bitrix/weather/lang/ru/exec/index.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/gadgets/bitrix/admin_security/index.php

Size: 4.50 kB Created: 2018-01-19 19:02:17 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/security/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/components/bitrix/main.interface.grid/component.php

Size: 9.39 kB Created: 2018-01-19 18:46:22 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["name"], $b["name"]);'); uasort($aOptions["views"], $func); $arResult["OPTIONS"] = $aOptions$arResult["GLOBAL_OPTIONS"] = CUserOptions::GetOption("main.interface""global", array(), 0); if($arParams["USE_THEMES"]) { if($arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID] <> ''$arResult["GLOBAL_OPTIONS"]["theme"] = $arResult["GLOBAL_OPTIONS"]["theme_template"][SITE_TEMPLATE_ID]; if($arResult["OPTIONS"]["theme"] == ''$arResult["OPTIONS"...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/components/bitrix/main.ui.grid/templates/.default/template.php

Size: 31.21 kB Created: 2018-01-19 19:02:20 Modified: 2023-11-27 14:53:26 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(<?=CUtil::phpToJSObject($arResult["DATA_FOR_EDIT"])?>);
        var defaultColumns = eval(<?=CUtil::phpToJSObject($arResult["DEFAULT_COLUMNS"])?>);
        var Grid = BX.Main.gridManager.getById('<?=$arParams["GRID_ID"]?>');
        var messages = eval(<?=CUtil::phpToJSObject($arResult["MESSAGES"])?>);

        Grid = Grid ? Grid.instance : null;

        if (Grid)
        {
            Grid.arParams.DEFAULT_COLUMNS = defaultColumns;
            Grid.arParams.MESSAGES = messages;

            if (action !== 'more')
            {
                Grid.arParams.EDITABLE_DATA ...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/components/bitrix/main.map/component.php

Size: 5.85 kB Created: 2018-01-17 22:07:16 Modified: 2023-11-27 14:53:26 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 157 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$full_path.".section.php")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } $search_child false$search_path ''$full_path ''; if ($aMenu[1] <> '') { if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) { $full_path $aMenu[1]; } else { $full_path trim(Rel2Abs(substr($PARENT_PATHstrlen($_SERVER["DOCUMENT_ROOT"])), $aMenu[1])); $slash_pos strrpos($full_path"/"); if ($slash_pos !== false) { $page substr($full_path$slash_pos+1); if(($pos strpos($page'?')) !== false$page substr($page,...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/components/bitrix/main.post.form/templates/.default/template.php

Size: 16.90 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:26 Dangers: 3
DescriptionMatch

Exploit execution Line: 117 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/lhe.php")

Exploit execution Line: 14 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/file.php")

Exploit execution Line: 15 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/urlpreview.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/components/bitrix/main.user.link/component.php

Size: 19.17 kB Created: 2018-01-19 18:59:48 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 440 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$folderPath."/card.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/bitrix/coupon_activation.php

Size: 16.58 kB Created: 2018-01-19 18:59:50 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 148 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/license_key.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/bitrix/index.php

Size: 83.00 B Created: 2018-01-17 22:07:20 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 2 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/wizard/template.php

Size: 9.12 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 42 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/wizard/wizard.php

Size: 132.22 kB Created: 2018-01-19 19:03:44 Modified: 2023-11-27 14:53:27 Warns: 1 Dangers: 5
DescriptionMatch

Exploit download_remote_code2 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($handler'<?require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php")

Exploit download_remote_code2 Line: 3991 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($handler,
            
'<'.'?require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php")

Exploit execution Line: 226 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/license_key.php')

Exploit execution Line: 2763 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_PERSONAL_ROOT."/php_interface/dbconn.php")

Exploit execution Line: 44 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcasecmp($a, $b);')); array_unshift($arModules"main"); return $arModules; } function GetNextStep($currentStep$currentStepStage$stepSuccess) { $stepIndex array_search($currentStep$this->arSteps); if ($currentStepStage == "utf8") { $nextStep $currentStep$nextStepStage "database"; } elseif ($currentStepStage == "database" && $stepSuccess) { $nextStep $currentStep$nextStepStage "files"; } else { if (!isset($this->arSteps[$stepIndex+1])) retur...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/wizard/utils.php

Size: 28.76 kB Created: 2018-01-19 19:03:44 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 547 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$wizardPath."/.description.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/wizard_sol/template.php

Size: 9.27 kB Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit execution Line: 40 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/.config.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/wizard_sol/utils.php

Size: 13.62 kB Created: 2018-01-17 22:07:10 Modified: 2023-11-27 14:53:27 Warns: 2 Dangers: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

create_function('$a, $b''return strcmp($a["SORT"], $b["SORT"]);')); return $arWizardTemplates; } function GetTemplatesPath($path) { $templatesPath $path."/templates"; if (file_exists($_SERVER["DOCUMENT_ROOT"].$templatesPath."/".LANGUAGE_ID)) $templatesPath .= "/".LANGUAGE_ID; return $templatesPath; } function GetServices($wizardPath$serviceFolder ""$arFilter = Array()) { $arServices = Array(); $wizardPath rtrim($wizardPath"/"); $serviceFolder rtrim($serviceFolder"/"); if (LANGU...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("?>".file_get_contents($documentRoot.$pathDir."/.access.php")); } if (!isset($PERM[$pathFile]) || !is_array($PERM[$pathFile])) $arPermisson $permissions; else $arPermisson $permissions $PERM[$pathFile]; return $GLOBALS["APPLICATION"]->SetFileAccessPermission($originalPath$arPermisson); } function AddMenuItem($menuFile$menuItem$siteID$pos = -1) { if (CModule::IncludeModule('fileman')) { $arResult CFileMan::GetMenuArray($_SERVER["DOCUMENT_ROOT"].$menuFile); $arMenuItems $arR...

Sign 11413268 Line: 313 Dangerous

Malware Signature (hash: 11413268)

eval("?>

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/map/default.php

Size: 13.58 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Warns: 1 Dangers: 6
DescriptionMatch

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$PARENT_PATH..trim($cmenu)

Exploit execution Line: 203 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$child_menu)

Exploit execution Line: 209 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$PARENT_PATH.".".trim($cmenu)

Exploit execution Line: 341 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$main_menu)

Exploit extract_global Line: 14 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

Exploit silenced_eval Line: 220 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine

@eval("return ".$CONDITION.";")

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("return ".$CONDITION.";"))) continue; } if (strlen($aMenu[1])>0) { $search_child true; if(preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$aMenu[1])) $full_path $aMenu[1]; else $full_path trim(Rel2Abs($PARENT_PATH$aMenu[1])); } else { $search_child false$full_path $PARENT_PATH; } if (strlen($full_path)>0) { $FILE_ACCESS = (preg_match("'^(([A-Za-z]+://)|mailto:|javascript:)'i"$full_path)) ? "R" $APPLICATION->GetFileAccessPermission($full_path); if ($FILE_ACCESS!="D" ...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/auth/authorize_registration.php

Size: 6.90 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/auth/authorize.php

Size: 3.79 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/auth/change_password.php

Size: 3.49 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/auth/forgot_password.php

Size: 2.54 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/auth/registration.php

Size: 6.25 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 2 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_REQUESTEXTR_SKIP)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/install/templates/main/profile.php

Size: 29.00 kB Created: 2018-01-17 22:07:13 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Exploit extract_global Line: 7 Dangerous

Code Injection, extracting global var arrays, allow remote attackers to inject PHP code on the target machine via HTTP request

extract($_POSTEXTR_SKIP)

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/en/classes/general/update_update5.php

Size: 25.89 kB Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of wesbsites using this product installation."; $MESS["SUP_CHECK_PROMT_1"] = "You can extend your period of technical support, purchase additi...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/en/classes/general/update_client.php

Size: 24.45 kB Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_CHECK_PROMT"] = "You can create not more than #NUM# site(s) based on this kernel according to your license."; $MESS["SUP_CHECK_PROMT_2"] = "You can create an unlimited number of websites using this product installation."; $MESS["SUP_CHECK_PROMT_21"] = "You can add unlimited number of users for the current product co...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/en/classes/general/update_update.php

Size: 22.66 kB Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install it first."; $MESS["SUP_SRC_ACT_ALT"] = "Download source code"; $MESS["SUP_SRC_ACT"] = "Download source code"; $MESS["SUP_SITES_PROMT"] = "You cannot create more than #NUM# site#END# using this kernel according to your license. If you need more sites, you can buy them any time. After you have purchased the additional sites, you will have to add them to the system."; $MESS["SUP_SITES_AC...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/en/admin/update_system.php

Size: 15.12 kB Created: 2018-01-17 22:07:21 Modified: 2023-11-27 14:53:28 Warns: 1
DescriptionMatch

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (in other wordsno updates may be available). If any of the module updates are availableplease install them first."; $MESS["SUP_SUBS_BUTTON"] = "Download source code"; $MESS["SUP_SUPPORT_BUTTON"] = "Reload All Files"; $MESS["SUP_INITIAL"] = "Initialising..."; $MESS["SUP_SUBS_SUCCESS"] = "The source code has been downloaded successfully"; $MESS["SUP_SUPPORT_SUCCESS"] = "Files has been downloaded successfully."; $MESS["SUP_SUBS_MED"] = "Downloaded source code for"; $MESS["SUP_SUPPORT_MED...

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/en/admin/site_checker.php

Size: 51.25 kB Created: 2018-01-19 18:56:20 Modified: 2023-11-27 14:53:27 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 92 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/ua/admin/site_checker.php

Size: 79.51 kB Created: 2018-01-19 19:01:39 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 84 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

/var/www/allstarsO/allstars.ua/bitrix/modules/main/lang/ru/admin/site_checker.php

Size: 81.03 kB Created: 2018-01-19 19:02:09 Modified: 2023-11-27 14:53:28 Dangers: 1
DescriptionMatch

Sign 471b95ee Line: 92 Dangerous

Malware Signature (hash: 471b95ee)

suhosin

/var/www/allstarsO/allstars.ua/bitrix/modules/main/start.php

Size: 12.83 kB Created: 2018-01-19 19:02:13 Modified: 2023-11-27 14:53:26 Dangers: 1
DescriptionMatch

Exploit execution Line: 237 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].BX_ROOT."/modules/main/include/dbconn_error.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/asd.iblock/classes/general/iblock_action.php

Size: 31.26 kB Created: 2023-03-11 16:39:38 Modified: 2023-11-27 14:53:20 Dangers: 1
DescriptionMatch

Exploit download_remote_code2 Line: 28 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite($hdlOutputCASDiblockTools::ExportPropsToXML($BID$_REQUEST['p'])

/var/www/allstarsO/allstars.ua/bitrix/modules/asd.iblock/install/index.php

Size: 6.16 kB Created: 2023-03-11 16:39:38 Modified: 2023-11-27 14:53:20 Dangers: 2
DescriptionMatch

Exploit execution Line: 105 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/main/include/prolog_admin_after.php')

Exploit execution Line: 115 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/main/include/epilog_admin.php')

/var/www/allstarsO/allstars.ua/bitrix/modules/bitrix.siteinfoportal/install/wizards/bitrix/infoportal/site/templates/info_light/components/bitrix/photogallery_user/.default/galleries_recalc.php

Size: 9.64 kB Created: 2023-03-11 16:40:31 Modified: 2023-11-27 14:53:22 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval("var result = " data "; "); }  
            if (
result['status'] == 'inprogress'
            {
                
document.getElementById('photogallery_recalc').innerHTML result['text']; 
                if (
__this_source.bReady == false)
                {
                    
document.getElementById('ButtonPhotoGalleryRecalcStart').disabled false
                    
document.getElementById('ButtonPhotoGalleryRecalcContinue').disabled false
                    
document.getElementById('ButtonPhotoGalleryRecalcStop').disabled true
                }
                else
                {
                    
document.getEleme...

/var/www/allstarsO/allstars.ua/bitrix/modules/seo/admin/seo_tools.php

Size: 39.07 kB Created: 2023-03-11 16:40:13 Modified: 2023-11-27 14:53:30 Dangers: 4
DescriptionMatch

Exploit execution Line: 102 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_win_changer_link'])

Exploit execution Line: 105 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_win_final'])

Exploit execution Line: 92 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_changer_link'])

Exploit execution Line: 95 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

base64_decode($_REQUEST['title_final'])

/var/www/allstarsO/allstars.ua/bitrix/modules/form/options.php

Size: 17.59 kB Created: 2023-03-11 16:40:20 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec(data.URL);
        if (!
res)
        {
            
data.URL 'http://' data.URL;
            
res r.exec(data.URL);
        }

        if (
res)
        {
            
data.URL_SERVER res[1]+'://'+res[2];
            
data.URL_PATH res[3];
        }
    }

    if (!
data.AUTH_HASH)
    {
        var 
content '<div class="form-crm-settings"><form name="form_'+popup_id+'"><table cellpadding="0" cellspacing="2" border="0"><tr><td align="right"><?=CUtil::JSEscape(GetMessage('FORM_TAB_CRM_ROW_TITLE'))?>:</td><td><input type="text" name="NAME" value="'+(data.NAME||'')+'"></td>...

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cformvalidator.php

Size: 368.00 B Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cformstatus.php

Size: 5.58 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cformoutput.php

Size: 400.00 B Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cformresult.php

Size: 15.00 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cformfield.php

Size: 413.00 B Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cformanswer.php

Size: 418.00 B Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/mysql/form_cform.php

Size: 5.95 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callformanswer.php

Size: 7.88 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_cform_old.php

Size: 9.24 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 77 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path.$template)

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callformstatus.php

Size: 17.77 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callformoutput.php

Size: 33.92 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Warns: 1 Dangers: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('?>'.$this->__cache_tpl.'<?'); $strReturn ob_get_contents(); ob_end_clean(); return $strReturn; } else { return false; } } function IncludeFormTemplate() { global $APPLICATION; if ($this->__check_form_cache()) { $APPLICATION->SetTemplateCSS("form/form.css"); $FORM =& $this; eval($this->__cache_tpl); return true; } else { return false; } } function isStatisticIncluded() { return CModule::IncludeModule("statistic"); } function __check_form_cache() { global $CACHE_MANAGER; if (strlen($this->...

Sign 11413268 Line: 100 Dangerous

Malware Signature (hash: 11413268)

eval('?>

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callform.php

Size: 64.56 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Warns: 2 Dangers: 1
DescriptionMatch

Exploit double_var2 Line: 522 Warning

Double var technique is usually used for the obfuscation of malicious code

${$var}

Exploit double_var2 Line: 532 Warning

Double var technique is usually used for the obfuscation of malicious code

${$var2}

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callformvalidator.php

Size: 7.56 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_cformresult_old.php

Size: 7.27 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 78 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$path.$template)

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callformfield.php

Size: 22.07 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/classes/general/form_callformresult.php

Size: 68.14 kB Created: 2023-03-11 16:40:22 Modified: 2023-11-27 14:53:24 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/form/admin/form_field_edit.php

Size: 31.00 kB Created: 2023-03-11 16:40:19 Modified: 2023-11-27 14:53:24 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval('function() {FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();}');
            
arInputs[i].onchange = new Function('FIELD_TYPE_CHANGE(\'' + (rows_count+1) + '\'); jsFormValidatorSettings.UpdateAll();');
        }

        if (
new_name == 'MESSAGE_' + (rows_count+1))
        {
            
arInputs[i].onchange jsFormValidatorSettings.UpdateAll;
        }
    }

    var 
input1 BX.create('INPUT', {
        
props: {
            
type'hidden',
            
name'ANSWER[]',
            
valuerows_count 1
        
}
    }),
        
input2 BX.create('...

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/mysql/support.php

Size: 57.97 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 14 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/mysql/update.php

Size: 457.00 B Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/mysql/dictionary.php

Size: 4.43 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/mysql/sla.php

Size: 3.73 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/mysql/reminder.php

Size: 385.00 B Created: 2023-03-11 16:41:39 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/holidays.php

Size: 9.67 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 28 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/" $module_id "/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/support.php

Size: 98.40 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 20 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/timetable.php

Size: 8.02 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 29 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/" $module_id "/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/timetablecache.php

Size: 19.81 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 92 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/" $moduleID "/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/search.php

Size: 12.96 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 13 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/" $module_id "/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/update.php

Size: 13.00 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 10 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/dictionary.php

Size: 10.79 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 9 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/sla.php

Size: 16.56 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 12 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/classes/general/reminder.php

Size: 19.74 kB Created: 2023-03-11 16:41:40 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 11 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/".$module_id."/install/version.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_graph.php

Size: 5.75 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_report_graph.php

Size: 20.00 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 24 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_sla_list.php

Size: 12.08 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 86 Warning

Double var technique is usually used for the obfuscation of malicious code

${$key}

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_diagram_time.php

Size: 2.72 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_diagram_mess.php

Size: 2.42 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 19 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_graph_legend.php

Size: 1.19 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ru/ticket_message_js.php

Size: 6.66 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Warns: 1
DescriptionMatch

Function eval Line: 29 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval(thetag "_open");
    if (
tagOpen == 0)
    {
        if (
DoInsert(objTextarea"<"+thetag+">""</"+thetag+">"))
        {
            eval(
thetag "_open = 1");
            eval(
"document.form1." thetag ".value += '*'");
        }
    }
    else
    {
        
DoInsert(objTextarea"</"+thetag+">""");
        eval(
"document.form1." thetag ".value = ' " + eval(thetag "_title") + " '");
        eval(
thetag "_open = 0");
    }
    
BX.fireEvent(objTextarea'change');
}

function 
mozillaWr(textareaopenclose)
{
    var 
selLength textarea.textLength;...

/var/www/allstarsO/allstars.ua/bitrix/modules/support/admin/ticket_desktop.php

Size: 23.98 kB Created: 2023-03-11 16:41:43 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 23 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/colors.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/install/events/set_events.php

Size: 6.00 kB Created: 2023-03-11 16:41:42 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/support/install/events/del_events.php")

/var/www/allstarsO/allstars.ua/bitrix/modules/support/install/index.php

Size: 8.05 kB Created: 2023-03-11 16:41:42 Modified: 2023-11-27 14:53:31 Dangers: 3
DescriptionMatch

Exploit execution Line: 144 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/support/install/events/set_events.php')

Exploit execution Line: 158 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'].'/bitrix/modules/support/install/events/del_events.php')

Exploit execution Line: 83 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER['DOCUMENT_ROOT'] . '/bitrix/modules/support/install/demodata.php')

/var/www/allstarsO/allstars.ua/bitrix/index.php

Size: 83.00 B Created: 2023-03-11 16:43:47 Modified: 2023-11-27 14:52:55 Dangers: 1
DescriptionMatch

Sign 0f37c730 Line: 2 Dangerous

Malware Signature (hash: 0f37c730)

meta http-equiv="REFRESH" content="0;

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/allstars/sale.basket.basket/.default/template.php

Size: 2.77 kB Created: 2023-03-11 16:37:13 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 69 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/basket_items.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/allstars/sale.basket.basket/delayed/template.php

Size: 2.31 kB Created: 2023-03-11 16:37:13 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 66 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delayed_items.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/allstars/sale.order.ajax/order_main_template/template.php

Size: 4.87 kB Created: 2023-03-11 16:37:13 Modified: 2023-11-27 14:53:31 Dangers: 5
DescriptionMatch

Exploit execution Line: 47 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

Exploit execution Line: 80 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 81 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 83 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 85 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/allstars/sale.order.ajax/order_main_template/props.php

Size: 4.64 kB Created: 2023-03-11 16:37:13 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/allstars/sale.order.ajax/order_main_template/related_props.php

Size: 408.00 B Created: 2023-03-11 16:37:13 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/bitrix/sale.order.ajax/template_1/template.php

Size: 7.30 kB Created: 2023-03-11 16:37:14 Modified: 2023-11-27 14:53:31 Dangers: 8
DescriptionMatch

Exploit execution Line: 213 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/person_type.php")

Exploit execution Line: 214 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props.php")

Exploit execution Line: 217 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/paysystem.php")

Exploit execution Line: 218 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/delivery.php")

Exploit execution Line: 226 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/related_props.php")

Exploit execution Line: 228 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/summary.php")

Exploit execution Line: 81 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/auth.php")

Exploit execution Line: 89 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/confirm.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/bitrix/sale.order.ajax/template_1/props.php

Size: 2.83 kB Created: 2023-03-11 16:37:14 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/bitrix/sale.order.ajax/template_1/related_props.php

Size: 408.00 B Created: 2023-03-11 16:37:14 Modified: 2023-11-27 14:53:31 Dangers: 1
DescriptionMatch

Exploit execution Line: 2 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"].$templateFolder."/props_format.php")

/var/www/allstarsO/allstars.ua/bitrix/templates/allstars/components/bitrix/sale.personal.order.list/order_history/template.php

Size: 15.06 kB Created: 2023-03-11 16:37:16 Modified: 2023-11-27 14:53:31 Dangers: 2
DescriptionMatch

Exploit execution Line: 175 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/payment/liqpay/payment.php")

Exploit execution Line: 81 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"] . "/bitrix/modules/sale/payment/liqpay/payment.php")

/var/www/allstarsO/allstars.ua/payment/index.php

Size: 2.15 kB Created: 2023-03-11 20:43:56 Modified: 2023-11-27 14:53:49 Dangers: 1
DescriptionMatch

Exploit execution Line: 38 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

include($_SERVER["DOCUMENT_ROOT"]."/bitrix/modules/sale/payment/liqpay/payment.php")

/var/www/allstarsO/allstars.ua/ai-bolit.php

Size: 381.90 kB Created: 2023-04-11 16:38:16 Modified: 2023-11-27 14:52:41 Warns: 17 Dangers: 47
DescriptionMatch

Exploit base64_long Line: 874 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTo0MzA6e2k6MDtzOjE1OiJ3NGwzWHpZMyBNYWlsZXIiO2k6MTtzOjEwOiJDb2RlZF9ieV9WIjtpOjI7czozNToibW92ZV91cGxvYWRlZF9maWxlKCRfRklMRVNbPHFxPkYxbDMiO2k6MztzOjEzOiJCeTxzMT5LeW1Mam5rIjtpOjQ7czoxMzoiQnk8czE+U2g0TGluayI7aTo1O3M6MTY6IkJ5PHMxPkFub25Db2RlcnMiO2k6NjtzOjQ2OiIkdXNlckFnZW50cyA9IGFycmF5KCJHb29nbGUiLCAiU2x1cnAiLCAiTVNOQm90IjtpOjc7czo2OiJbM3Jhbl0iO2k6ODtzOjEwOiJEYXduX2FuZ2VsIjtpOjk7czo4OiJSM0RUVVhFUyI7aToxMDtzOjIwOiJ2aXNpdG9yVHJhY2tlcl9pc01vYiI7aToxMTtzOjI0OiJjb21fY29udGVudC9hcnRpY2xlZC5waHAiO2k6MTI7czo...

Exploit base64_long Line: 875 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTo2Mzp7aTowO3M6NzoiZGVmYWNlciI7aToxO3M6MjQ6IllvdSBjYW4gcHV0IGEgbWQ1IHN0cmluZyI7aToyO3M6ODoicGhwc2hlbGwiO2k6MztzOjYyOiI8ZGl2IGNsYXNzPSJibG9jayBidHlwZTEiPjxkaXYgY2xhc3M9ImR0b3AiPjxkaXYgY2xhc3M9ImRidG0iPiI7aTo0O3M6ODoiYzk5c2hlbGwiO2k6NTtzOjg6InI1N3NoZWxsIjtpOjY7czo3OiJOVERhZGR5IjtpOjc7czo4OiJjaWhzaGVsbCI7aTo4O3M6NzoiRnhjOTlzaCI7aTo5O3M6MTI6IldlYiBTaGVsbCBieSI7aToxMDtzOjExOiJkZXZpbHpTaGVsbCI7aToxMTtzOjI1OiJIYWNrZWQgYnkgQWxmYWJldG9WaXJ0dWFsIjtpOjEyO3M6ODoiTjN0c2hlbGwiO2k6MTM7czoxMToiU3Rvcm03U2hlbGw...

Exploit base64_long Line: 876 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTozMzM6e2k6MDtzOjM1OiJkZWZhdWx0X2FjdGlvblxzKj1ccypcXFsnIl1GaWxlc01hbiI7aToxO3M6MzM6ImRlZmF1bHRfYWN0aW9uXHMqPVxzKlsnIl1GaWxlc01hbiI7aToyO3M6MTAwOiJJTzo6U29ja2V0OjpJTkVULT5uZXdcKFByb3RvXHMqPT5ccyoidGNwIlxzKixccypMb2NhbFBvcnRccyo9PlxzKjM2MDAwXHMqLFxzKkxpc3RlblxzKj0+XHMqU09NQVhDT05OIjtpOjM7czo5NjoiXCRfKEdFVHxQT1NUfFNFUlZFUnxDT09LSUV8UkVRVUVTVClcW1xzKlsnIl17MCwxfXAyWyciXXswLDF9XHMqXF1ccyo9PVxzKlsnIl17MCwxfWNobW9kWyciXXswLDF9IjtpOjQ7czoyMzoiQ2FwdGFpblxzK0NydW5jaFxzK1RlYW0iO2k6NTtzOjExOiJieVxzK0dyaW5...

Exploit base64_long Line: 877 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTozNDI6e2k6MDtzOjY4OiJmaWxlX2dldF9jb250ZW50c1woU1JWX05BTUVccypcLlxzKlsnIl1cP2FjdGlvbj1nZXRfc2l0ZXMmbm9kYV9uYW1lPSI7aToxO3M6NDA6IkxvY2F0aW9uOlxzKlthLXpBLVowLTlfXStcLmRvY3VtZW50XC5leGUiO2k6MjtzOjQwOiJpZlwoIXByZWdfbWF0Y2hcKFsnIl0vSGFja2VkIGJ5L2lbJyJdLFwkIjtpOjM7czo5OiJCeVxzK0FtIXIiO2k6NDtzOjE5OiJDb250ZW50LVR5cGU6XHMqXCRfIjtpOjU7czo0MDoiZXZhbFxzKlwoKlxzKmd6aW5mbGF0ZVxzKlwoKlxzKnN0cl9yb3QxMyI7aTo2O3M6MTA5OiJpZlxzKlwoXHMqaXNfY2FsbGFibGVccypcKCpccypbJyJdezAsMX1cYihmdHBfZXhlY3xzeXN0ZW18c2hlbGxfZXhlY3x...

Exploit base64_long Line: 879 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YToxNDI6e2k6MDtzOjM3OiJlY2hvICI8c2NyaXB0PiBhbGVydFwoJyJcLlwkZGItPmdldEVyIjtpOjE7czo0MDoiZWNobyAiPHNjcmlwdD4gYWxlcnRcKCciXC5cJG1vZGVsLT5nZXRFciI7aToyO3M6ODoic29ydFwoXCkiO2k6MztzOjEwOiJtdXN0LXJldmFsIjtpOjQ7czo2OiJyaWV2YWwiO2k6NTtzOjk6ImRvdWJsZXZhbCI7aTo2O3M6NjY6InJlcXVpcmVccypcKCpccypcJF9TRVJWRVJcW1xzKlsnIl17MCwxfURPQ1VNRU5UX1JPT1RbJyJdezAsMX1ccypcXSI7aTo3O3M6NzE6InJlcXVpcmVfb25jZVxzKlwoKlxzKlwkX1NFUlZFUlxbXHMqWyciXXswLDF9RE9DVU1FTlRfUk9PVFsnIl17MCwxfVxzKlxdIjtpOjg7czo2NjoiaW5jbHVkZVxzKlwoKlxzKlw...

Exploit base64_long Line: 880 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YToxNTk6e2k6MDtzOjI1OiJzbGlua3NcLnN1L2dldF9saW5rc1wucGhwIjtpOjE7czoxMzoiTUxfbGNvZGVcLnBocCI7aToyO3M6MTM6Ik1MXyVjb2RlXC5waHAiO2k6MztzOjE5OiJjb2Rlc1wubWFpbmxpbmtcLnJ1IjtpOjQ7czoxOToiX19saW5rZmVlZF9yb2JvdHNfXyI7aTo1O3M6MTM6IkxJTktGRUVEX1VTRVIiO2k6NjtzOjE0OiJMaW5rZmVlZENsaWVudCI7aTo3O3M6MTg6Il9fc2FwZV9kZWxpbWl0ZXJfXyI7aTo4O3M6Mjk6ImRpc3BlbnNlclwuYXJ0aWNsZXNcLnNhcGVcLnJ1IjtpOjk7czoxMToiTEVOS19jbGllbnQiO2k6MTA7czoxMToiU0FQRV9jbGllbnQiO2k6MTE7czoxNjoiX19saW5rZmVlZF9lbmRfXyI7aToxMjtzOjE2OiJTTEFydGljbGV...

Exploit base64_long Line: 881 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTo5NDp7aTowO3M6MTE6IkNWVjpccypcJGN2IjtpOjE7czoxMzoiSW52YWxpZFxzK1RWTiI7aToyO3M6MTE6IkludmFsaWQgUlZOIjtpOjM7czo0MDoiZGVmYXVsdFN0YXR1c1xzKj1ccypbJyJdSW50ZXJuZXQgQmFua2luZyI7aTo0O3M6Mjg6Ijx0aXRsZT5ccypDYXBpdGVjXHMrSW50ZXJuZXQiO2k6NTtzOjI3OiI8dGl0bGU+XHMqSW52ZXN0ZWNccytPbmxpbmUiO2k6NjtzOjM5OiJpbnRlcm5ldFxzK1BJTlxzK251bWJlclxzK2lzXHMrcmVxdWlyZWQiO2k6NztzOjExOiI8dGl0bGU+U2FycyI7aTo4O3M6MTM6Ijxicj5BVE1ccytQSU4iO2k6OTtzOjE4OiJDb25maXJtYXRpb25ccytPVFAiO2k6MTA7czoyNToiPHRpdGxlPlxzKkFic2FccytJbnRlcm5ldCI...

Exploit base64_long Line: 882 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YToyOTU6e2k6MDtzOjk1OiI8c2NyaXB0PnZhciBcdz0nJztccypzZXRUaW1lb3V0XChcZCtcKTsuKz9kZWZhdWx0X2tleS4rP3NlX3JlLis/ZGVmYXVsdF9rZXkuKz9mX3VybC4rPzwvc2NyaXB0PiI7aToxO3M6MTE0OiI8c2NyaXB0W14+XSs+dmFyIGE9Lis/U3RyaW5nXC5mcm9tQ2hhckNvZGVcKGFcLmNoYXJDb2RlQXRcKGlcKVxeMlwpfWM9dW5lc2NhcGVcKGJcKTtkb2N1bWVudFwud3JpdGVcKGNcKTs8L3NjcmlwdD4iO2k6MjtzOjI1MDoidmFyIFx3Kz1cWyJcZCsiLC4rPyJcZCsiXF07ZnVuY3Rpb24gXHcrXChcdytcKXt2YXIgXHcrPWRvY3VtZW50XFtcdytcKFx3K1xbXGQrXF1cKVxdXChcdytcKFx3K1xbXGQrXF1cKVwrXHcrXChcdytcW1xkK1xdXCk...

Exploit base64_long Line: 883 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTo3NDp7aTowO3M6NDg6ImRvY3VtZW50XC53cml0ZVxzKlwoXHMqdW5lc2NhcGVccypcKFsnIl17MCwxfSUzYyI7aToxO3M6Njk6ImRvY3VtZW50XC5nZXRFbGVtZW50c0J5VGFnTmFtZVwoWyciXWhlYWRbJyJdXClcWzBcXVwuYXBwZW5kQ2hpbGRcKGFcKSI7aToyO3M6Mjg6ImlwXChob25lXHxvZFwpXHxpcmlzXHxraW5kbGUiO2k6MztzOjQ4OiJzbWFydHBob25lXHxibGFja2JlcnJ5XHxtdGtcfGJhZGFcfHdpbmRvd3MgcGhvbmUiO2k6NDtzOjMwOiJjb21wYWxcfGVsYWluZVx8ZmVubmVjXHxoaXB0b3AiO2k6NTtzOjIyOiJlbGFpbmVcfGZlbm5lY1x8aGlwdG9wIjtpOjY7czoyOToiXChmdW5jdGlvblwoYSxiXCl7aWZcKC9cKGFuZHIiO2k6NztzOjQ5OiJ...

Exploit base64_long Line: 884 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YToxMzE6e2k6MDtzOjE0OiJAKmV4dHJhY3RccypcKCI7aToxO3M6MTQ6IkAqZXh0cmFjdFxzKlwkIjtpOjI7czoxMjoiWyciXWV2YWxbJyJdIjtpOjM7czoyMToiWyciXWJhc2U2NF9kZWNvZGVbJyJdIjtpOjQ7czoyMzoiWyciXWNyZWF0ZV9mdW5jdGlvblsnIl0iO2k6NTtzOjE0OiJbJyJdYXNzZXJ0WyciXSI7aTo2O3M6NDM6ImZvcmVhY2hccypcKFxzKlwkZW1haWxzXHMrYXNccytcJGVtYWlsXHMqXCkiO2k6NztzOjc6IlNwYW1tZXIiO2k6ODtzOjE1OiJldmFsXHMqWyciXChcJF0iO2k6OTtzOjE3OiJhc3NlcnRccypbJyJcKFwkXSI7aToxMDtzOjI4OiJzcnBhdGg6Ly9cLlwuL1wuXC4vXC5cLi9cLlwuIjtpOjExO3M6MTI6InBocGluZm9ccypcKCI7aTo...

Exploit base64_long Line: 885 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YToxMjE6e2k6MDtpOjA7aToxO2k6MDtpOjI7aTowO2k6MztpOjA7aTo0O2k6MDtpOjU7aTowO2k6NjtpOjA7aTo3O2k6MDtpOjg7aToxO2k6OTtpOjE7aToxMDtpOjA7aToxMTtpOjA7aToxMjtpOjA7aToxMztpOjA7aToxNDtpOjA7aToxNTtpOjA7aToxNjtpOjA7aToxNztpOjA7aToxODtpOjA7aToxOTtpOjA7aToyMDtpOjA7aToyMTtpOjA7aToyMjtpOjA7aToyMztpOjA7aToyNDtpOjA7aToyNTtpOjA7aToyNjtpOjA7aToyNztpOjA7aToyODtpOjA7aToyOTtpOjE7aTozMDtpOjE7aTozMTtpOjA7aTozMjtpOjA7aTozMztpOjA7aTozNDtpOjA7aTozNTtpOjA7aTozNjtpOjA7aTozNztpOjA7aTozODtpOjA7aTozOTtpOjA7aTo0MDtpOjA7aTo0MTtpOjA...

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

"YTo1MzA6e2k6MDtzOjE0OiJCT1RORVRccytQQU5FTCI7aToxO3M6MTg6Ij09XHMqWyciXTQ2XC4yMjlcLiI7aToyO3M6MTg6Ij09XHMqWyciXTkxXC4yNDNcLiI7aTozO3M6NToiSlRlcm0iO2k6NDtzOjU6Ik9uZXQ3IjtpOjU7czo5OiJcJHBhc3NfdXAiO2k6NjtzOjU6InhDZWR6IjtpOjc7czoxMTY6ImlmXHMqXChccypmdW5jdGlvbl9leGlzdHNccypcKFxzKlsnIl17MCwxfVxiKGZ0cF9leGVjfHN5c3RlbXxzaGVsbF9leGVjfHBhc3N0aHJ1fHBvcGVufHByb2Nfb3BlbilbJyJdezAsMX1ccypcKVxzKlwpIjtpOjg7czoyNzoiXCRPT08uKz89XHMqdXJsZGVjb2RlXHMqXCgqIjtpOjk7czozODoic3RyZWFtX3NvY2tldF9jbGllbnRccypcKFxzKlsnIl10Y3A...

Exploit double_var2 Line: 3756 Warning

Double var technique is usually used for the obfuscation of malicious code

${$p}

Exploit download_remote_code2 Line: 85 Dangerous

RFU (Remote File Upload), via HTTP, allow to write malicious code on the target machine

fwrite|fputs|file_get_|call_user_func|file_put_|\$_REQUEST|ob_start|\$_GET|\$_POST|\$_SERVER|\$_FILES|move|copy|array_|reg_replace|mysql_|chr|fsockopen|\$GLOBALS|sqliteCreateFunction';
$g_VirusFiles = array('
js', 'html', 'htm', 'suspicious')

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

eval($form->ScriptDisplay);') !== false) { $l_Vuln['id'] = 'RCE RSFORM rsform.phpLINE 1605'; $l_Vuln['ndx'] = $par_Index; $g_Vulnerable[] = $l_Vuln; return true; } return false; } if (strpos($par_Filename, 'fancybox-for-wordpress/fancybox.php') !== false) { if (strpos($par_Content, '\'reset\' == $_REQUEST[\'action\']') !== false) { $l_Vuln['id'] = 'CODE INJECTION : FANCYBOX'$l_Vuln['ndx'] = $par_Index$g_Vulnerable[] = $l_Vuln; return true; } return false; } if (strpos($par_Filename'c...

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

exec("zip -v 2>&1"$output$code); if ($code == 0) { $filter ''; if ($configFiles && exec("grep -V 2>&1"$output$code) && $code == 0) { $filter "|grep -v -E '$configFilesRegex'"; } exec("cat AI-BOLIT-DOUBLECHECK.php $filter |zip -@ --password $g_QuarantinePass $archive"$output$code); if ($code == 0) { file_put_contents($infoFile$info); $m = array(); if (!empty($filter)) { foreach ($configFiles as $file) { $tmp file_get_contents($file); $tmp preg_replace('~^.*?pass.*~im''', $...

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

posix_getpwuid($lStat['uid']) : array('name' => $lStat['uid']); $group = (function_exists('posix_getgrgid')) ? @posix_getgrgid($lStat['gid']) : array('name' => $lStat['uid']); $inf['permission'][] = $perm$inf['owner'][] = $owner['name']; $inf['group'][] = $group['name']; $inf['size'][] = $lStat['size'] > bytes2Human($lStat['size']) : '-'$inf['ctime'][] = $lStat['ctime'] > date("d/m/Y H:i:s"$lStat['ctime']) : '-'$inf['mtime'][] = $lStat['mtime'] > date("d/m/Y H:i:s"$lStat['m...

Function system Warning

Potentially dangerous function `system`

[https://www.php.net/system]

system (Default: 1)
  -
x, --mode=INT       Set scan mode- for basic- for expert and for paranoic.
  -
k, --skip=jpg,...   Skip specific extensionsE.g. --skip=jpg,gif,png,xls,pdf
      
--scan=php,...   Scan only specific extensionsE.g. --scan=php,htaccess,js
  
-r, --report=PATH/EMAILS
                       Full path to create report 
or email address to send report to.
                       
You can also specify multiple email separated by commas.
  -
q,                Use only with ...

Sign 085a0329 Line: 874 Dangerous

Malware Signature (hash: 085a0329)

iYXNlNj

Sign 085a0329 Line: 877 Dangerous

Malware Signature (hash: 085a0329)

IVFRQX1VTRVJfQUdFTl

Sign 0f37c730 Line: 874 Dangerous

Malware Signature (hash: 0f37c730)

mdW5jdGlvb

Sign 11413268 Line: 2530 Dangerous

Malware Signature (hash: 11413268)

exploit

Sign 162cf671 Line: 875 Dangerous

Malware Signature (hash: 162cf671)

HTE9CQUxT

Sign 162cf671 Line: 876 Dangerous

Malware Signature (hash: 162cf671)

hUVFBfVVNFUl9BR0VOV

Sign 34b7e999 Line: 876 Dangerous

Malware Signature (hash: 34b7e999)

dMT0JBTF

Sign 407651f7 Line: 876 Dangerous

Malware Signature (hash: 407651f7)

w/cGhw

Sign 407651f7 Line: 877 Dangerous

Malware Signature (hash: 407651f7)

wcmludG

Sign 471b95ee Line: 874 Dangerous

Malware Signature (hash: 471b95ee)

SFRUUF9VU0VSX0FHRU5U

Sign 4a069524 Line: 874 Dangerous

Malware Signature (hash: 4a069524)

aW5jbHVkZ

Sign 5c38b15f Line: 2637 Dangerous

Malware Signature (hash: 5c38b15f)

1337day.com

Sign 7186bb8d Line: 258 Dangerous

Malware Signature (hash: 7186bb8d)

rootkit

Sign 7186bb8d Line: 874 Dangerous

Malware Signature (hash: 7186bb8d)

RfR0VU

Sign 7186bb8d Line: 876 Dangerous

Malware Signature (hash: 7186bb8d)

RfQ09PS0lF

Sign 7186bb8d Line: 877 Dangerous

Malware Signature (hash: 7186bb8d)

RlZmluZ

Sign 7830f7a6 Line: 874 Dangerous

Malware Signature (hash: 7830f7a6)

NvcH

Sign 7830f7a6 Line: 876 Dangerous

Malware Signature (hash: 7830f7a6)

N0YX

Sign 7f5d33bf Line: 874 Dangerous

Malware Signature (hash: 7f5d33bf)

Jhc2U2N

Sign 7f5d33bf Line: 876 Dangerous

Malware Signature (hash: 7f5d33bf)

JlcGxhY2

Sign 7f5d33bf Line: 877 Dangerous

Malware Signature (hash: 7f5d33bf)

jbG9zZ

Sign 7f5d33bf Line: 878 Dangerous

Malware Signature (hash: 7f5d33bf)

JlcXVpcm

Sign 91535293 Line: 874 Dangerous

Malware Signature (hash: 91535293)

lY2hv

Sign 91535293 Line: 876 Dangerous

Malware Signature (hash: 91535293)

ldmFs

Sign 91535293 Line: 878 Dangerous

Malware Signature (hash: 91535293)

leHRyYWN0

Sign 963e968a Line: 874 Dangerous

Malware Signature (hash: 963e968a)

PD9waH

Sign 963e968a Line: 876 Dangerous

Malware Signature (hash: 963e968a)

pbmNsdWRl

Sign a408f408 Line: 874 Dangerous

Malware Signature (hash: a408f408)

c2hlbG

Sign a408f408 Line: 876 Dangerous

Malware Signature (hash: a408f408)

c3RyX

Sign a408f408 Line: 878 Dangerous

Malware Signature (hash: a408f408)

cmVxdWlyZ

Sign ae7830db Line: 874 Dangerous

Malware Signature (hash: ae7830db)

YmFzZTY0

Sign ae7830db Line: 876 Dangerous

Malware Signature (hash: ae7830db)

YXJyYXlf

Sign ae7830db Line: 878 Dangerous

Malware Signature (hash: ae7830db)

yZXF1aXJl

Sign bced5841 Line: 874 Dangerous

Malware Signature (hash: bced5841)

8P3Boc

Sign d30fc49e Line: 874 Dangerous

Malware Signature (hash: d30fc49e)

b3Blb

Sign d30fc49e Line: 877 Dangerous

Malware Signature (hash: d30fc49e)

ByaW50Z

Sign d97f004d Line: 874 Dangerous

Malware Signature (hash: d97f004d)

ZWNob

Sign d97f004d Line: 875 Dangerous

Malware Signature (hash: d97f004d)

ZXZhb

Sign d97f004d Line: 876 Dangerous

Malware Signature (hash: d97f004d)

zeXN0ZW

Sign d97f004d Line: 878 Dangerous

Malware Signature (hash: d97f004d)

ZXh0cmFjd

Sign de12c454 Line: 874 Dangerous

Malware Signature (hash: de12c454)

vcGVu

Sign de12c454 Line: 876 Dangerous

Malware Signature (hash: de12c454)

V4dHJhY3

Sign e6546205 Line: 874 Dangerous

Malware Signature (hash: e6546205)

kX1JFUVVFU1

Sign e6546205 Line: 876 Dangerous

Malware Signature (hash: e6546205)

kZWZpbm

Sign ee1cb326 Line: 874 Dangerous

Malware Signature (hash: ee1cb326)

9wZW

Sign ff4f5344 Line: 876 Dangerous

Malware Signature (hash: ff4f5344)

FycmF5X